· 6 years ago · Oct 15, 2019, 05:44 AM
1#######################################################################################################################################
2=======================================================================================================================================
3 Hostname www.manisa.pol.tr ISP Turkiye Cumhuriyeti Icisleri Bakanligi
4Continent Asia Flag
5TR
6Country Turkey Country Code TR
7Region Ankara Local time 13 Oct 2019 12:55 +03
8City Ankara Postal Code 06470
9IP Address 2.58.141.4 Latitude 39.923
10======================================================================================================================================
11#######################################################################################################################################
12> www.manisa.pol.tr
13Server: 38.132.106.139
14Address: 38.132.106.139#53
15
16Non-authoritative answer:
17www.manisa.pol.tr canonical name = manisa.pol.tr.
18Name: manisa.pol.tr
19Address: 2.58.141.4
20>
21#######################################################################################################################################
22** Domain Name: manisa.pol.tr
23
24** Registrant:
25 MANİSA İL EMNİYET MÜDÜRLÜĞÜ
26 1.ANAFARTALAR MAHALLESİ
27 CUMHURİYET CAD. NO:50
28 Manisa,
29 Türkiye
30 bilgi@manisapolis.gov.tr
31 + 90-236-2314601-6020
32 + 90-236-2315805
33
34
35** Administrative Contact:
36NIC Handle : ebi90-metu
37Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
38Address : Hidden upon user request
39Phone : + 90-312-4624260-4260
40Fax : Hidden upon user request
41
42
43** Technical Contact:
44NIC Handle : ebi90-metu
45Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
46Address : Hidden upon user request
47Phone : + 90-312-4624260-4260
48Fax : Hidden upon user request
49
50
51** Billing Contact:
52NIC Handle : ebi90-metu
53Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
54Address : Hidden upon user request
55Phone : + 90-312-4624260-4260
56Fax : Hidden upon user request
57
58
59** Domain Servers:
60ns.manisa.pol.tr 82.222.167.180
61ns2.manisa.pol.tr 82.222.167.181
62
63** Additional Info:
64Created on..............: 2004-Apr-07.
65Expires on..............: 2020-Apr-06.
66#######################################################################################################################################
67[+] Target : www.manisa.pol.tr
68
69[+] IP Address : 2.58.141.4
70
71[+] Headers :
72
73[+] Cache-Control : private, no-store, max-age=180, no-cache
74[+] Content-Type : text/html; charset=utf-8
75[+] Expires : Sun, 13 Oct 2019 10:06:17 GMT
76[+] Last-Modified : Sun, 13 Oct 2019 10:03:17 GMT
77[+] Vary : *
78[+] Server : Microsoft-IIS/10.0
79[+] Set-Cookie : ASP.NET_SessionId=zlqxleague0zvnf3uoembtf4; path=/; HttpOnly, NSC_ESNS=7c0f23b7-f653-1da2-9678-ba8b1843e7c4_3995309087_2677260581_00000000006375684259; Path=/; Expires=Sun, 13-Oct-2019 10:03:31 GMT
80[+] X-AspNetMvc-Version : 5.2
81[+] X-AspNet-Version : 4.0.30319
82[+] X-Powered-By : ASP.NET
83[+] Date : Sun, 13 Oct 2019 10:03:16 GMT
84[+] X-Via-NSCOPI : 1.0
85[+] Transfer-Encoding : chunked
86
87[+] SSL Certificate Information :
88
89[-] SSL is not Present on Target URL...Skipping...
90
91[+] Whois Lookup :
92
93[+] NIR : None
94[+] ASN Registry : ripencc
95[+] ASN : 209171
96[+] ASN CIDR : 2.58.141.0/24
97[+] ASN Country Code : TR
98[+] ASN Date : 2019-03-21
99[+] ASN Description : ICISLERI, TR
100[+] cidr : 2.58.140.0/22
101[+] name : TR-ICISLERI-20190321
102[+] handle : MOK24-RIPE
103[+] range : 2.58.140.0 - 2.58.143.255
104[+] description : None
105[+] country : TR
106[+] state : None
107[+] city : None
108[+] address : Devlet Mahallesi, ankaya/Ankara
10906580
110Ankara
111TURKEY
112[+] postal_code : None
113[+] emails : None
114[+] created : 2019-03-21T16:39:03Z
115[+] updated : 2019-03-21T16:39:03Z
116
117[+] Crawling Target...
118
119[+] Looking for robots.txt........[ Found ]
120[+] Extracting robots Links.......[ 5 ]
121[+] Looking for sitemap.xml.......[ Not Found ]
122[+] Extracting CSS Links..........[ 2 ]
123[+] Extracting Javascript Links...[ 6 ]
124[+] Extracting Internal Links.....[ 18 ]
125[+] Extracting External Links.....[ 30 ]
126[+] Extracting Images.............[ 10 ]
127
128[+] Total Links Extracted : 71
129
130[+] Dumping Links in /opt/FinalRecon/dumps/www.manisa.pol.tr.dump
131[+] Completed!
132#####################################################################################################################################
133
134[+] Starting At 2019-10-13 06:04:02.331716
135[+] Collecting Information On: http://www.manisa.pol.tr/
136[#] Status: 200
137--------------------------------------------------
138[#] Web Server Detected: Microsoft-IIS/10.0
139[#] X-Powered-By: ASP.NET
140[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
141- Cache-Control: private, no-store, max-age=180, no-cache
142- Content-Type: text/html; charset=utf-8
143- Expires: Sun, 13 Oct 2019 10:07:02 GMT
144- Last-Modified: Sun, 13 Oct 2019 10:04:02 GMT
145- Vary: *
146- Server: Microsoft-IIS/10.0
147- Set-Cookie: ASP.NET_SessionId=guyy3bfpx0if3s0zbv31ml22; path=/; HttpOnly, NSC_ESNS=7c1b93c3-f680-1da2-9678-ba8b1843e7c4_3609236511_2794504485_00000000010671540671; Path=/; Expires=Sun, 13-Oct-2019 10:04:16 GMT
148- X-AspNetMvc-Version: 5.2
149- X-AspNet-Version: 4.0.30319
150- X-Powered-By: ASP.NET
151- Date: Sun, 13 Oct 2019 10:04:01 GMT
152- X-Via-NSCOPI: 1.0
153- Transfer-Encoding: chunked
154--------------------------------------------------
155[#] Finding Location..!
156[#] as: AS209171 Turkiye Cumhuriyeti Icisleri Bakanligi
157[#] city: Ankara
158[#] country: Turkey
159[#] countryCode: TR
160[#] isp: Icisleri Bakanligi
161[#] lat: 39.9146
162[#] lon: 32.852
163[#] org: Turkiye Cumhuriyeti Icisleri Bakanligi
164[#] query: 2.58.141.4
165[#] region: 06
166[#] regionName: Ankara
167[#] status: success
168[#] timezone: Europe/Istanbul
169[#] zip:
170--------------------------------------------------
171[+] Detected WAF Presence in web application: ASP.NET Generic Web Application Protection
172--------------------------------------------------
173[#] Starting Reverse DNS
174[!] Found 3 any Domain
175- ankara.pol.tr
176- manisa.pol.tr
177- www.antalya.pol.tr
178--------------------------------------------------
179[!] Scanning Open Port
180--------------------------------------------------
181[+] Collecting Information Disclosure!
182[#] Detecting sitemap.xml file
183[-] sitemap.xml file not Found!?
184[#] Detecting robots.txt file
185[!] robots.txt File Found: http://www.manisa.pol.tr//robots.txt
186[#] Detecting GNU Mailman
187[-] GNU Mailman App Not Detected!?
188--------------------------------------------------
189[+] Crawling Url Parameter On: http://www.manisa.pol.tr/
190--------------------------------------------------
191[#] Searching Html Form !
192[-] No Html Form Found!?
193--------------------------------------------------
194[!] Found 42 dom parameter
195[#] http://www.manisa.pol.tr//#MobileSlideMenu
196[#] http://www.manisa.pol.tr//#
197[#] http://www.manisa.pol.tr//#
198[#] http://www.manisa.pol.tr//#
199[#] http://www.manisa.pol.tr//#
200[#] http://www.manisa.pol.tr//#
201[#] http://www.manisa.pol.tr//#
202[#] http://www.manisa.pol.tr//#
203[#] http://www.manisa.pol.tr//#
204[#] http://www.manisa.pol.tr//#
205[#] http://www.manisa.pol.tr//#
206[#] http://www.manisa.pol.tr//#
207[#] http://www.manisa.pol.tr//#
208[#] http://www.manisa.pol.tr//#
209[#] http://www.manisa.pol.tr//#
210[#] http://www.manisa.pol.tr//#menu_148150
211[#] http://www.manisa.pol.tr//#
212[#] http://www.manisa.pol.tr//#
213[#] http://www.manisa.pol.tr//#menu_148155
214[#] http://www.manisa.pol.tr//#
215[#] http://www.manisa.pol.tr//#
216[#] http://www.manisa.pol.tr//#
217[#] http://www.manisa.pol.tr//#
218[#] http://www.manisa.pol.tr//#
219[#] http://www.manisa.pol.tr//#
220[#] http://www.manisa.pol.tr//#
221[#] http://www.manisa.pol.tr//#menu_148130
222[#] http://www.manisa.pol.tr//#menu_148150
223[#] http://www.manisa.pol.tr//#
224[#] http://www.manisa.pol.tr//#
225[#] http://www.manisa.pol.tr//#menu_148154
226[#] http://www.manisa.pol.tr//#menu_148155
227[#] http://www.manisa.pol.tr//#
228[#] http://www.manisa.pol.tr//#
229[#] http://www.manisa.pol.tr//#
230[#] http://www.manisa.pol.tr//#
231[#] http://www.manisa.pol.tr//#
232[#] http://www.manisa.pol.tr//#
233[#] http://www.manisa.pol.tr//#
234[#] http://www.manisa.pol.tr//#menu_148169
235[#] http://www.manisa.pol.tr//#menu_148177
236[#] http://www.manisa.pol.tr//#menu_148182
237--------------------------------------------------
238[!] 12 Internal Dynamic Parameter Discovered
239[+] http://www.manisa.pol.tr///Icerik/css?v=OPZ4yxrNaPzWEKRih6_2ceq24FELJMoiJoh8-0CrrSQ1
240[+] http://www.manisa.pol.tr///WebPart/WarningCard-css?v=Ax4MkRcGSi2v0jQXd1QDMoQjggjF7vno4C9A4dDlM4o1
241[+] http://www.manisa.pol.tr///WebPart/FSlider-css?v=RSZigIGfhKaohuGGo4LqrvXh_b3mofobziyJ2PMis0Y1
242[+] http://www.manisa.pol.tr///WebPart/section-header-css?v=8-IxQ3JeR7j48t5eivgCqrGjQ9UFd3ROcpaNsNBlZJ41
243[+] http://www.manisa.pol.tr///WebPart/SliderNews-css?v=Mm1HEGI3OIMFeTkKqrHV0Jb8ddKVAuOKEw3m38xP2sg1
244[+] http://www.manisa.pol.tr///WebPart/section-header-css?v=8-IxQ3JeR7j48t5eivgCqrGjQ9UFd3ROcpaNsNBlZJ41
245[+] http://www.manisa.pol.tr///WebPart/Announcement-css?v=bey2yifbJmazQt0Hi_Ub2ftdwRNKVhvHZyuEbR-0Srs1
246[+] http://www.manisa.pol.tr///WebPart/QuickList-css?v=tjKjA68YCSMoXqb_E5B0sxeUPmkEb2DSYbFXBoZgIrU1
247[+] http://www.manisa.pol.tr///WebPart/ESocialMediaTwitter-css?v=y2X2pquLvZLXXbPZxk0X6gTXWP81tHTt1I4DBsy94bs1
248[+] http://www.manisa.pol.tr///WebPart/section-header-css?v=8-IxQ3JeR7j48t5eivgCqrGjQ9UFd3ROcpaNsNBlZJ41
249[+] http://www.manisa.pol.tr///WebPart/ELinkList-css?v=QWPpyzTBzwioa8nGhdfC0Sn_B_3HPEdEti8ORZr_6Uk1
250[+] http://www.manisa.pol.tr///WebPart/ERadioCard-css?v=M8dHn_way17PkR6VsX37y59anP-OlX8VbMoABr1gPYQ1
251--------------------------------------------------
252[!] 8 External Dynamic Parameter Discovered
253[#] https://fonts.googleapis.com/css?family=Roboto&subset=latin-ext
254[#] https://www.turkiye.gov.tr/kurumlar?kurumKodu=13
255[#] https://www.mgm.gov.tr/tahmin/il-ve-ilceler.aspx?il=Manisa
256[#] https://www.turkiye.gov.tr/kurumlar?kurumKodu=13
257[#] https://www.turkiye.gov.tr/kurumlar?kurumKodu=13
258[#] https://play.google.com/store/apps/details?id=tr.gov.egm.polisradyosu
259[#] https://www.turkiye.gov.tr/kurumlar?kurumKodu=13
260[#] https://www.turkiye.gov.tr/kurumlar?kurumKodu=13
261--------------------------------------------------
262[!] 71 Internal links Discovered
263[+] http://www.manisa.pol.tr///Areas/WebPart/Contents/ValilikHeader/css/v1header.css
264[+] http://www.manisa.pol.tr//javascript:void(0);
265[+] http://www.manisa.pol.tr
266[+] http://www.manisa.pol.tr
267[+] http://www.manisa.pol.tr////www.manisa.pol.tr/il-emniyet-mudurumuz-sayin-omer-uslusoy
268[+] http://www.manisa.pol.tr////www.manisa.pol.tr/kolluk-etik-ilkeleri
269[+] http://www.manisa.pol.tr////www.manisa.pol.tr/yonet
270[+] http://www.manisa.pol.tr////www.manisa.pol.tr/kamu-hizmetleri
271[+] http://www.manisa.pol.tr////www.manisa.pol.tr/bilgi-edinme
272[+] http://www.manisa.pol.tr////www.manisa.pol.tr/haberler
273[+] http://www.manisa.pol.tr////www.manisa.pol.tr/duyurular
274[+] http://www.manisa.pol.tr////www.manisa.pol.tr/alo-140-teror-ihbar-hatti23
275[+] http://www.manisa.pol.tr////www.manisa.pol.tr/iletisim-bilgileri
276[+] http://www.manisa.pol.tr////www.manisa.pol.tr/ilce-emniyet-mudurlukleri
277[+] http://www.manisa.pol.tr//javascript:void(0);
278[+] http://www.manisa.pol.tr//javascript:void(0);
279[+] http://www.manisa.pol.tr////www.manisa.pol.tr/il-emniyet-mudurumuz-sayin-omer-uslusoy
280[+] http://www.manisa.pol.tr////www.manisa.pol.tr/kolluk-etik-ilkeleri
281[+] http://www.manisa.pol.tr////www.manisa.pol.tr/yonet
282[+] http://www.manisa.pol.tr////www.manisa.pol.tr/kamu-hizmetleri
283[+] http://www.manisa.pol.tr////www.manisa.pol.tr/bilgi-edinme
284[+] http://www.manisa.pol.tr////www.manisa.pol.tr/haberler
285[+] http://www.manisa.pol.tr////www.manisa.pol.tr/duyurular
286[+] http://www.manisa.pol.tr////www.manisa.pol.tr/alo-140-teror-ihbar-hatti23
287[+] http://www.manisa.pol.tr////www.manisa.pol.tr/iletisim-bilgileri
288[+] http://www.manisa.pol.tr////www.manisa.pol.tr/ilce-emniyet-mudurlukleri
289[+] http://www.manisa.pol.tr////www.manisa.pol.tr/kamu-hizmetleri
290[+] http://www.manisa.pol.tr///haberler
291[+] http://www.manisa.pol.tr////www.manisa.pol.tr/pasaport-sube-mudurlugu21
292[+] http://www.manisa.pol.tr////www.manisa.pol.tr/haber22
293[+] http://www.manisa.pol.tr///duyurular
294[+] http://www.manisa.pol.tr////www.manisa.pol.tr/bilgi-edinme
295[+] http://www.manisa.pol.tr////www.manisa.pol.tr/egm-internet-sitemiz-yenilendi
296[+] http://www.manisa.pol.tr////www.manisa.pol.tr/sifir-atik-basin-bulteni15
297[+] http://www.manisa.pol.tr////www.manisa.pol.tr/valilik-karari7
298[+] http://www.manisa.pol.tr////www.manisa.pol.tr/bilgi-edinme
299[+] http://www.manisa.pol.tr////www.manisa.pol.tr/egm-internet-sitemiz-yenilendi
300[+] http://www.manisa.pol.tr////www.manisa.pol.tr/sifir-atik-basin-bulteni15
301[+] http://www.manisa.pol.tr////www.manisa.pol.tr/valilik-karari7
302[+] http://www.manisa.pol.tr/mubadele-ilani-2
303[+] http://www.manisa.pol.tr/bilgi-edinme
304[+] https://www.facebook.com/manisa.pol.tr
305[+] http://www.manisa.pol.tr//" target=
306[+] http://www.manisa.pol.tr//" target=
307[+] http://www.manisa.pol.tr//" target=
308[+] http://www.manisa.pol.tr//" target=
309[+] http://www.manisa.pol.tr//" target=
310[+] http://www.manisa.pol.tr//" target=
311[+] http://www.manisa.pol.tr//" target=
312[+] http://www.manisa.pol.tr//" target=
313[+] http://www.manisa.pol.tr///Areas/WebPart/Contents/EFooter/css/EFooter.css
314[+] http://www.manisa.pol.tr///il-emniyet-mudurumuz-sayin-omer-uslusoy
315[+] http://www.manisa.pol.tr///kolluk-etik-ilkeleri
316[+] http://www.manisa.pol.tr///yonet
317[+] http://www.manisa.pol.tr///kamu-hizmetleri
318[+] http://www.manisa.pol.tr///bilgi-edinme
319[+] http://www.manisa.pol.tr///haberler
320[+] http://www.manisa.pol.tr///duyurular
321[+] http://www.manisa.pol.tr///alo-140-teror-ihbar-hatti23
322[+] http://www.manisa.pol.tr///iletisim-bilgileri
323[+] http://www.manisa.pol.tr///ilce-emniyet-mudurlukleri
324[+] http://www.manisa.pol.tr///il-emniyet-mudurumuz-sayin-omer-uslusoy
325[+] http://www.manisa.pol.tr///kolluk-etik-ilkeleri
326[+] http://www.manisa.pol.tr///yonet
327[+] http://www.manisa.pol.tr///kamu-hizmetleri
328[+] http://www.manisa.pol.tr///bilgi-edinme
329[+] http://www.manisa.pol.tr///haberler
330[+] http://www.manisa.pol.tr///duyurular
331[+] http://www.manisa.pol.tr///alo-140-teror-ihbar-hatti23
332[+] http://www.manisa.pol.tr///iletisim-bilgileri
333[+] http://www.manisa.pol.tr///ilce-emniyet-mudurlukleri
334--------------------------------------------------
335[!] 65 External links Discovered
336[#] https://www.turkiye.gov.tr/
337[#] https://www.icisleri.gov.tr/
338[#] https://www.egm.gov.tr/
339[#] http://www.manisa.gov.tr/
340[#] https://www.egm.gov.tr/hakkimizda
341[#] https://www.egm.gov.tr/ataturk-ve-turk-polisi
342[#] https://www.egm.gov.tr/tarihce
343[#] https://www.egm.gov.tr/sehitlerimiz
344[#] http://www.trafik.gov.tr/Sayfalar/default.aspx
345[#] https://onlineislemler.egm.gov.tr/Manisa/Sayfalar/ozelguvenliksorguyeni.aspx
346[#] https://www.pa.edu.tr/
347[#] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
348[#] https://onlineislemler.egm.gov.tr/trafik/Sayfalar/EDSHarita.aspx
349[#] https://onlineislemler.egm.gov.tr/Sayfalar/kayipsahiscocuk.aspx
350[#] https://onlineislemler.egm.gov.tr/Sayfalar/KimligiBelirsizCeset.aspx
351[#] https://onlineislemler.egm.gov.tr/Sayfalar/sinav_sonuc.aspx
352[#] https://arackiralama.egm.gov.tr/
353[#] https://www.egm.gov.tr/hakkimizda
354[#] https://www.egm.gov.tr/ataturk-ve-turk-polisi
355[#] https://www.egm.gov.tr/tarihce
356[#] https://onlineislemler.egm.gov.tr/Manisa/Sayfalar/ozelguvenliksorguyeni.aspx
357[#] https://www.pa.edu.tr/
358[#] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
359[#] https://onlineislemler.egm.gov.tr/trafik/Sayfalar/EDSHarita.aspx
360[#] https://onlineislemler.egm.gov.tr/Sayfalar/kayipsahiscocuk.aspx
361[#] https://onlineislemler.egm.gov.tr/Sayfalar/KimligiBelirsizCeset.aspx
362[#] https://onlineislemler.egm.gov.tr/Sayfalar/sinav_sonuc.aspx
363[#] https://arackiralama.egm.gov.tr/
364[#] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
365[#] https://onlineislemler.egm.gov.tr/Sayfalar/mobil.aspx
366[#] https://onlineislemler.egm.gov.tr/Sayfalar/TrafikCezaSorgulama.aspx
367[#] https://twitter.com/manisa_pol_tr
368[#] https://www.cimer.gov.tr/
369[#] http://www.jandarma.gov.tr/
370[#] https://www.sg.gov.tr/
371[#] http://www.goc.gov.tr/
372[#] https://www.afad.gov.tr/
373[#] https://www.cimer.gov.tr/
374[#] http://www.jandarma.gov.tr/
375[#] https://www.sg.gov.tr/
376[#] http://www.goc.gov.tr/
377[#] https://www.afad.gov.tr/
378[#] http://www.polisradyosu.pol.tr/
379[#] https://www.egm.gov.tr/hakkimizda
380[#] https://www.egm.gov.tr/ataturk-ve-turk-polisi
381[#] https://www.egm.gov.tr/tarihce
382[#] https://onlineislemler.egm.gov.tr/Manisa/Sayfalar/ozelguvenliksorguyeni.aspx
383[#] https://www.pa.edu.tr/
384[#] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
385[#] https://onlineislemler.egm.gov.tr/trafik/Sayfalar/EDSHarita.aspx
386[#] https://onlineislemler.egm.gov.tr/Sayfalar/kayipsahiscocuk.aspx
387[#] https://onlineislemler.egm.gov.tr/Sayfalar/KimligiBelirsizCeset.aspx
388[#] https://onlineislemler.egm.gov.tr/Sayfalar/sinav_sonuc.aspx
389[#] https://arackiralama.egm.gov.tr/
390[#] https://www.egm.gov.tr/hakkimizda
391[#] https://www.egm.gov.tr/ataturk-ve-turk-polisi
392[#] https://www.egm.gov.tr/tarihce
393[#] https://onlineislemler.egm.gov.tr/Manisa/Sayfalar/ozelguvenliksorguyeni.aspx
394[#] https://www.pa.edu.tr/
395[#] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
396[#] https://onlineislemler.egm.gov.tr/trafik/Sayfalar/EDSHarita.aspx
397[#] https://onlineislemler.egm.gov.tr/Sayfalar/kayipsahiscocuk.aspx
398[#] https://onlineislemler.egm.gov.tr/Sayfalar/KimligiBelirsizCeset.aspx
399[#] https://onlineislemler.egm.gov.tr/Sayfalar/sinav_sonuc.aspx
400[#] https://arackiralama.egm.gov.tr/
401--------------------------------------------------
402[#] Mapping Subdomain..
403[!] Found 4 Subdomain
404- manisa.pol.tr
405- ns2.manisa.pol.tr
406- mail.manisa.pol.tr
407- ns.manisa.pol.tr
408--------------------------------------------------
409[!] Done At 2019-10-13 06:05:05.585042
410######################################################################################################################################
411[i] Scanning Site: http://www.manisa.pol.tr
412
413
414
415B A S I C I N F O
416====================
417
418
419[+] Site Title:
420[+] IP address: 2.58.141.4
421[+] Web Server: Microsoft-IIS/10.0
422[+] CMS: Could Not Detect
423[+] Cloudflare: Not Detected
424[+] Robots File: Found
425
426-------------[ contents ]----------------
427
428User-agent: *
429Disallow: /kullanicilar
430Disallow: /ortak_icerik
431Disallow: /kurumlar
432Disallow: /Kurumlar
433Disallow: /Kullanicilar
434-----------[end of contents]-------------
435
436
437
438W H O I S L O O K U P
439========================
440
441 ** Domain Name: manisa.pol.tr
442
443** Registrant:
444 MANİSA İL EMNİYET MÜDÜRLÜĞÜ
445 1.ANAFARTALAR MAHALLESİ
446 CUMHURİYET CAD. NO:50
447 Manisa,
448 Türkiye
449 bilgi@manisapolis.gov.tr
450 + 90-236-2314601-6020
451 + 90-236-2315805
452
453
454** Administrative Contact:
455NIC Handle : ebi90-metu
456Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
457Address : Hidden upon user request
458Phone : + 90-312-4624260-4260
459Fax : Hidden upon user request
460
461
462** Technical Contact:
463NIC Handle : ebi90-metu
464Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
465Address : Hidden upon user request
466Phone : + 90-312-4624260-4260
467Fax : Hidden upon user request
468
469
470** Billing Contact:
471NIC Handle : ebi90-metu
472Organization Name : EGM BİLGİ İŞLEM DAİRESİ BAŞKANLIĞI
473Address : Hidden upon user request
474Phone : + 90-312-4624260-4260
475Fax : Hidden upon user request
476
477
478** Domain Servers:
479ns.manisa.pol.tr 82.222.167.180
480ns2.manisa.pol.tr 82.222.167.181
481
482** Additional Info:
483Created on..............: 2004-Apr-07.
484Expires on..............: 2020-Apr-06.
485
486
487
488
489G E O I P L O O K U P
490=========================
491
492[i] IP Address: 2.58.141.4
493[i] Country: Turkey
494[i] State:
495[i] City:
496[i] Latitude: 41.0214
497[i] Longitude: 28.9948
498
499
500
501
502H T T P H E A D E R S
503=======================
504
505
506[i] HTTP/1.1 200 OK
507[i] Cache-Control: private, no-store, max-age=180
508[i] Content-Type: text/html; charset=utf-8
509[i] Expires: Sun, 13 Oct 2019 10:06:44 GMT
510[i] Last-Modified: Sun, 13 Oct 2019 10:03:44 GMT
511[i] Vary: *
512[i] Server: Microsoft-IIS/10.0
513[i] Set-Cookie: ASP.NET_SessionId=uvsoujglgonkhss0mnfbsno0; path=/; HttpOnly
514[i] X-AspNetMvc-Version: 5.2
515[i] X-AspNet-Version: 4.0.30319
516[i] X-Powered-By: ASP.NET
517[i] Date: Sun, 13 Oct 2019 10:03:44 GMT
518[i] Connection: keep-alive
519[i] X-Via-NSCOPI: 1.0
520[i] Transfer-Encoding: chunked
521[i] Set-Cookie: NSC_ESNS=7c03501f-f66e-1da2-9678-ba8b1843e7c4_1420661791_0622706981_00000000014964844771; Path=/; Expires=Sun, 13-Oct-2019 10:03:59 GMT
522[i] Cache-Control: no-cache
523
524
525
526
527D N S L O O K U P
528===================
529
530manisa.pol.tr. 899 IN A 2.58.141.4
531manisa.pol.tr. 3599 IN NS ns.manisa.pol.tr.
532manisa.pol.tr. 59 IN SOA ns.manisa.pol.tr. hosting.egm.gov.tr. 78 10800 3600 604800 10800
533manisa.pol.tr. 10799 IN MX 10 mail.manisa.pol.tr.
534
535
536
537
538S U B N E T C A L C U L A T I O N
539====================================
540
541Address = 2.58.141.4
542Network = 2.58.141.4 / 32
543Netmask = 255.255.255.255
544Broadcast = not needed on Point-to-Point links
545Wildcard Mask = 0.0.0.0
546Hosts Bits = 0
547Max. Hosts = 1 (2^0 - 0)
548Host Range = { 2.58.141.4 - 2.58.141.4 }
549
550
551
552N M A P P O R T S C A N
553============================
554
555Starting Nmap 7.70 ( https://nmap.org ) at 2019-10-13 10:03 UTC
556Nmap scan report for manisa.pol.tr (2.58.141.4)
557Host is up (0.13s latency).
558
559PORT STATE SERVICE
56021/tcp filtered ftp
56122/tcp filtered ssh
56223/tcp filtered telnet
56380/tcp open http
564110/tcp filtered pop3
565143/tcp filtered imap
566443/tcp filtered https
5673389/tcp filtered ms-wbt-server
568
569Nmap done: 1 IP address (1 host up) scanned in 3.90 seconds
570
571
572
573S U B - D O M A I N F I N D E R
574==================================
575
576
577[i] Total Subdomains Found : 3
578
579[+] Subdomain: ns2.manisa.pol.tr
580[-] IP: 82.222.167.141
581
582[+] Subdomain: mail.manisa.pol.tr
583[-] IP: 82.222.167.141
584
585[+] Subdomain: ns.manisa.pol.tr
586[-] IP: 82.222.167.141
587######################################################################################################################################
588[INFO] ------TARGET info------
589[*] TARGET: http://www.manisa.pol.tr/
590[*] TARGET IP: 2.58.141.4
591[INFO] NO load balancer detected for www.manisa.pol.tr...
592[*] DNS servers: manisa.pol.tr.
593[*] TARGET server: Microsoft-IIS/10.0
594[*] CC: TR
595[*] Country: Turkey
596[*] RegionCode: 06
597[*] RegionName: Ankara
598[*] City: Ankara
599[*] ASN: AS209171
600[*] BGP_PREFIX: 2.58.141.0/24
601[*] ISP: icisleri Turkiye Cumhuriyeti Icisleri Bakanligi, TR
602[INFO] DNS enumeration:
603[*] ftp.manisa.pol.tr manisa.pol.tr. 2.58.141.4
604[*] mail.manisa.pol.tr 82.222.167.141
605[*] ns2.manisa.pol.tr 82.222.167.181
606[*] webmail.manisa.pol.tr 82.222.167.141
607[INFO] Possible abuse mails are:
608[*] bilisimaglari@icisleri.gov.tr
609[INFO] NO PAC (Proxy Auto Configuration) file FOUND
610[ALERT] robots.txt file FOUND in http://www.manisa.pol.tr/robots.txt
611[INFO] Checking for HTTP status codes recursively from http://www.manisa.pol.tr/robots.txt
612[INFO] Status code Folders
613[*] 200 http://www.manisa.pol.tr/Kullanicilar
614[INFO] Starting FUZZing in http://www.manisa.pol.tr/FUzZzZzZzZz...
615[INFO] Status code Folders
616[*] 200 http://www.manisa.pol.tr/index
617[*] 200 http://www.manisa.pol.tr/images
618[*] 200 http://www.manisa.pol.tr/download
619[*] 200 http://www.manisa.pol.tr/2006
620[*] 200 http://www.manisa.pol.tr/news
621[*] 200 http://www.manisa.pol.tr/crack
622[*] 200 http://www.manisa.pol.tr/serial
623[*] 200 http://www.manisa.pol.tr/warez
624[*] 200 http://www.manisa.pol.tr/full
625[*] 200 http://www.manisa.pol.tr/12
626[ALERT] Look in the source code. It may contain passwords
627
628Transfert de données terminé
629HTTP/1.1 302 Found
630Il ne s’agit pas d’une URL absolue.
631Utilisation de http://2.58.141.4/Login/Ev/Giris
632Recherche 2.58.141.4
633Connexion HTTP à 2.58.141.4
634Envoi de la requête HTTP.
635Requête HTTP envoyée. Attente de réponse.
636HTTP/1.1 302 Found
637Transfert de données terminé
638HTTP/1.1 302 Found
639Il ne s’agit pas d’une URL absolue.
640Utilisation de http://2.58.141.4/Login/Ev/Giris
641Recherche 2.58.141.4
642Connexion HTTP à 2.58.141.4
643Envoi de la requête HTTP.
644Requête HTTP envoyée. Attente de réponse.
645HTTP/1.1 302 Found
646Transfert de données terminé
647HTTP/1.1 302 Found
648Il ne s’agit pas d’une URL absolue.
649Utilisation de http://2.58.141.4/Login/Ev/Giris
650Recherche 2.58.141.4
651Connexion HTTP à 2.58.141.4
652Envoi de la requête HTTP.
653Requête HTTP envoyée. Attente de réponse.
654HTTP/1.1 302 Found
655Transfert de données terminé
656HTTP/1.1 302 Found
657Il ne s’agit pas d’une URL absolue.
658Utilisation de http://2.58.141.4/Login/Ev/Giris
659Recherche 2.58.141.4
660Connexion HTTP à 2.58.141.4
661Envoi de la requête HTTP.
662Requête HTTP envoyée. Attente de réponse.
663HTTP/1.1 302 Found
664Transfert de données terminé
665HTTP/1.1 302 Found
666Il ne s’agit pas d’une URL absolue.
667Utilisation de http://2.58.141.4/Login/Ev/Giris
668
669lynx : accès impossible au fichier de départ http://2.58.141.4/
670[INFO] Links found from http://www.manisa.pol.tr/ http://2.58.141.4/:
671[*] https://arackiralama.egm.gov.tr/
672[*] https://onlineislemler.egm.gov.tr/Manisa/Sayfalar/ozelguvenliksorguyeni.aspx
673[*] https://onlineislemler.egm.gov.tr/Sayfalar/Ihbar.aspx
674[*] https://onlineislemler.egm.gov.tr/Sayfalar/kayipsahiscocuk.aspx
675[*] https://onlineislemler.egm.gov.tr/Sayfalar/KimligiBelirsizCeset.aspx
676[*] https://onlineislemler.egm.gov.tr/Sayfalar/mobil.aspx
677[*] https://onlineislemler.egm.gov.tr/Sayfalar/sinav_sonuc.aspx
678[*] https://onlineislemler.egm.gov.tr/Sayfalar/TrafikCezaSorgulama.aspx
679[*] https://onlineislemler.egm.gov.tr/trafik/Sayfalar/EDSHarita.aspx
680[*] https://play.google.com/store/apps/details?id=tr.gov.egm.polisradyosu
681[*] https://twitter.com/manisa_pol_tr
682[*] https://www.afad.gov.tr/
683[*] https://www.cimer.gov.tr/
684[*] https://www.egm.gov.tr/
685[*] https://www.egm.gov.tr/ataturk-ve-turk-polisi
686[*] https://www.egm.gov.tr/hakkimizda
687[*] https://www.egm.gov.tr/sehitlerimiz
688[*] https://www.egm.gov.tr/tarihce
689[*] https://www.facebook.com/manisa.pol.tr
690[*] https://www.icisleri.gov.tr/
691[*] https://www.mgm.gov.tr/tahmin/il-ve-ilceler.aspx?il=Manisa
692[*] https://www.pa.edu.tr/
693[*] https://www.sg.gov.tr/
694[*] https://www.turkiye.gov.tr/
695[*] https://www.turkiye.gov.tr/kurumlar?kurumKodu=13
696[*] http://www.goc.gov.tr/
697[*] http://www.jandarma.gov.tr/
698[*] http://www.manisa.gov.tr/
699[*] http://www.manisa.pol.tr/
700[*] http://www.manisa.pol.tr/alo-140-teror-ihbar-hatti23
701[*] http://www.manisa.pol.tr/bilgi-edinme
702[*] http://www.manisa.pol.tr/duyurular
703[*] http://www.manisa.pol.tr/egm-internet-sitemiz-yenilendi
704[*] http://www.manisa.pol.tr/haber22
705[*] http://www.manisa.pol.tr/haberler
706[*] http://www.manisa.pol.tr/ilce-emniyet-mudurlukleri
707[*] http://www.manisa.pol.tr/il-emniyet-mudurumuz-sayin-omer-uslusoy
708[*] http://www.manisa.pol.tr/iletisim-bilgileri
709[*] http://www.manisa.pol.tr/kamu-hizmetleri
710[*] http://www.manisa.pol.tr/kolluk-etik-ilkeleri
711[*] http://www.manisa.pol.tr/#menu_148130
712[*] http://www.manisa.pol.tr/#menu_148150
713[*] http://www.manisa.pol.tr/#menu_148154
714[*] http://www.manisa.pol.tr/#menu_148155
715[*] http://www.manisa.pol.tr/#menu_148169
716[*] http://www.manisa.pol.tr/#menu_148177
717[*] http://www.manisa.pol.tr/#menu_148182
718[*] http://www.manisa.pol.tr/#MobileSlideMenu
719[*] http://www.manisa.pol.tr/mubadele-ilani-2
720[*] http://www.manisa.pol.tr/pasaport-sube-mudurlugu21
721[*] http://www.manisa.pol.tr/sifir-atik-basin-bulteni15
722[*] http://www.manisa.pol.tr/valilik-karari7
723[*] http://www.manisa.pol.tr/yonet
724[*] http://www.polisradyosu.pol.tr/
725[*] http://www.trafik.gov.tr/Sayfalar/default.aspx
726[INFO] BING shows 2.58.141.4 is shared with 8,290 hosts/vhosts
727[INFO] Shodan detected the following opened ports on 2.58.141.4:
728[*] 80
729[INFO] ------VirusTotal SECTION------
730[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
731[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
732[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
733[INFO] ------Alexa Rank SECTION------
734[INFO] Percent of Visitors Rank in Country:
735[INFO] Percent of Search Traffic:
736[INFO] Percent of Unique Visits:
737[INFO] Total Sites Linking In:
738[*] Total Sites
739[INFO] Useful links related to www.manisa.pol.tr - 2.58.141.4:
740[*] https://www.virustotal.com/pt/ip-address/2.58.141.4/information/
741[*] https://www.hybrid-analysis.com/search?host=2.58.141.4
742[*] https://www.shodan.io/host/2.58.141.4
743[*] https://www.senderbase.org/lookup/?search_string=2.58.141.4
744[*] https://www.alienvault.com/open-threat-exchange/ip/2.58.141.4
745[*] http://pastebin.com/search?q=2.58.141.4
746[*] http://urlquery.net/search.php?q=2.58.141.4
747[*] http://www.alexa.com/siteinfo/www.manisa.pol.tr
748[*] http://www.google.com/safebrowsing/diagnostic?site=www.manisa.pol.tr
749[*] https://censys.io/ipv4/2.58.141.4
750[*] https://www.abuseipdb.com/check/2.58.141.4
751[*] https://urlscan.io/search/#2.58.141.4
752[*] https://github.com/search?q=2.58.141.4&type=Code
753[INFO] Useful links related to AS209171 - 2.58.141.0/24:
754[*] http://www.google.com/safebrowsing/diagnostic?site=AS:209171
755[*] https://www.senderbase.org/lookup/?search_string=2.58.141.0/24
756[*] http://bgp.he.net/AS209171
757[*] https://stat.ripe.net/AS209171
758[INFO] Date: 13/10/19 | Time: 06:05:58
759[INFO] Total time: 1 minute(s) and 55 second(s)
760#######################################################################################################################################
761Trying "manisa.pol.tr"
762;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 37698
763;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 1, ADDITIONAL: 1
764
765;; QUESTION SECTION:
766;manisa.pol.tr. IN ANY
767
768;; ANSWER SECTION:
769manisa.pol.tr. 10800 IN MX 10 mail.manisa.pol.tr.
770manisa.pol.tr. 60 IN SOA ns.manisa.pol.tr. hosting.egm.gov.tr. 78 10800 3600 604800 10800
771manisa.pol.tr. 900 IN A 2.58.141.4
772manisa.pol.tr. 3600 IN NS ns.manisa.pol.tr.
773
774;; AUTHORITY SECTION:
775manisa.pol.tr. 3600 IN NS ns.manisa.pol.tr.
776
777;; ADDITIONAL SECTION:
778ns.manisa.pol.tr. 43200 IN A 82.222.167.180
779
780Received 167 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 313 ms
781#######################################################################################################################################
782; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace manisa.pol.tr
783;; global options: +cmd
784. 81750 IN NS f.root-servers.net.
785. 81750 IN NS m.root-servers.net.
786. 81750 IN NS i.root-servers.net.
787. 81750 IN NS h.root-servers.net.
788. 81750 IN NS c.root-servers.net.
789. 81750 IN NS a.root-servers.net.
790. 81750 IN NS l.root-servers.net.
791. 81750 IN NS j.root-servers.net.
792. 81750 IN NS g.root-servers.net.
793. 81750 IN NS e.root-servers.net.
794. 81750 IN NS d.root-servers.net.
795. 81750 IN NS k.root-servers.net.
796. 81750 IN NS b.root-servers.net.
797. 81750 IN RRSIG NS 8 0 518400 20191026050000 20191013040000 22545 . CYy3cGcuboPqKwrxHJHJoW74tuiTKcNY4yWf5xPKT1e99huNZMrdNY6X mlXs2CZuPKeGyr6jUXTWFrD1oaoPXDsTT51HOf8K1YCTfgKONcOZ8XiM g/Uzk3XhASmxAIroJBdw6cUqWYeeI3yV46RgImXYy+xLiLBzzuoALPvw JtVUhrypDnecBmUztRq1hyeZ6Y1aSUQAb5QC4X7ldPw4DSUltw20/f91 6f0pASwt5H/b4Asbn5x8js25JsxMrhsaKjIix3CFipXDVT1MsHdMm9zt ijfdVSn+jHS3+ViEbzF5+gjIx5MR36bkyC0uXnjQ9HD1uLqD6Lub09DK 3kqfnw==
798;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 27 ms
799
800tr. 172800 IN NS ns42.nic.tr.
801tr. 172800 IN NS ns31.nic.tr.
802tr. 172800 IN NS ns92.nic.tr.
803tr. 172800 IN NS ns91.nic.tr.
804tr. 172800 IN NS ns21.nic.tr.
805tr. 172800 IN NS ns22.nic.tr.
806tr. 172800 IN NS ns41.nic.tr.
807tr. 86400 IN NSEC trade. NS RRSIG NSEC
808tr. 86400 IN RRSIG NSEC 8 1 86400 20191026050000 20191013040000 22545 . qLkK3mW8tBWDQykml+Q8/NQw7AEsyXgWkJ+v7LVClZOrK0xp2itaxbl+ jV+M8MdU/VNwdd8ErJqzxXMKYeqNYbT6fJhBBS7vXPtbOrdShK5k7O6w R0ELnPFag7s5/5LqEkHTnBUQfBI8D02Nd/Jzy8nOLdTutY0tVWYSiLjH e3KV32a+YMttFHarAR54rtkNfXNk9cAFGbFlZLUoNzGJBOodFyDFwqb+ KVzXArMwXJ+RsmOHEX6Pa9HufiY1MeZBeZhmAY3meSLr3dTHLUdA+pAr CZaFZO1PBRQ3pUK+RpbcLlDZ5M+wNWrHqZaOI5B+FhhuFC8l5R3BVMml UDyLzQ==
809;; Received 717 bytes from 198.41.0.4#53(a.root-servers.net) in 32 ms
810
811manisa.pol.tr. 43200 IN NS ns2.manisa.pol.tr.
812manisa.pol.tr. 43200 IN NS ns.manisa.pol.tr.
813;; Received 109 bytes from 2600:2000:3003::1#53(ns92.nic.tr) in 274 ms
814
815manisa.pol.tr. 900 IN A 2.58.141.4
816;; Received 58 bytes from 82.222.167.180#53(ns.manisa.pol.tr) in 176 ms
817#######################################################################################################################################
818[*] Performing General Enumeration of Domain: manisa.pol.tr
819[-] DNSSEC is not configured for manisa.pol.tr
820[*] SOA ns.manisa.pol.tr 82.222.167.180
821[*] NS ns.manisa.pol.tr 82.222.167.180
822[*] NS ns2.manisa.pol.tr 82.222.167.141
823[*] MX mail.manisa.pol.tr 82.222.167.141
824[*] A manisa.pol.tr 2.58.141.4
825[*] Enumerating SRV Records
826[-] No SRV Records Found for manisa.pol.tr
827[+] 0 Records Found
828#####################################################################################################################################
829[*] Processing domain manisa.pol.tr
830[*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a', '192.168.0.1']
831[+] Getting nameservers
83282.222.167.180 - ns.manisa.pol.tr
83382.222.167.141 - ns2.manisa.pol.tr
834[-] Zone transfer failed
835
836[+] MX records found, added to target list
83710 mail.manisa.pol.tr.
838
839[*] Scanning manisa.pol.tr for A records
8402.58.141.4 - manisa.pol.tr
8412.58.141.4 - ftp.manisa.pol.tr
84282.222.167.141 - mail.manisa.pol.tr
84382.222.167.141 - mssql.manisa.pol.tr
84482.222.167.180 - ns.manisa.pol.tr
84582.222.167.141 - ns2.manisa.pol.tr
84682.222.167.141 - sitebuilder.manisa.pol.tr
84782.222.167.141 - webmail.manisa.pol.tr
8482.58.141.4 - www.manisa.pol.tr
849#######################################################################################################################################
850Ip Address Status Type Domain Name Server
851---------- ------ ---- ----------- ------
8522.58.141.4 302 alias ftp.manisa.pol.tr Microsoft-IIS/10.0
8532.58.141.4 302 host manisa.pol.tr Microsoft-IIS/10.0
85482.222.167.141 404 host mail.manisa.pol.tr Microsoft-HTTPAPI/2.0
85582.222.167.141 200 host mssql.manisa.pol.tr Microsoft-IIS/7.5
85682.222.167.180 host ns.manisa.pol.tr
85782.222.167.141 200 host ns2.manisa.pol.tr Microsoft-IIS/7.5
85882.222.167.141 404 host webmail.manisa.pol.tr Microsoft-HTTPAPI/2.0
8592.58.141.4 200 alias www.manisa.pol.tr Microsoft-IIS/10.0
8602.58.141.4 200 host manisa.pol.tr Microsoft-IIS/10.0
861#######################################################################################################################################
862[+] Testing domain
863 www.manisa.pol.tr 2.58.141.4
864[+] Dns resolving
865 Domain name Ip address Name server
866 No address associated with hostname manisa.pol.tr
867[+] Testing wildcard
868 Ok, no wildcard found.
869
870[+] Scanning for subdomain on manisa.pol.tr
871[!] Wordlist not specified. I scannig with my internal wordlist...
872 Estimated time about 843.15 seconds
873
874 Subdomain Ip address Name server
875
876 mail.manisa.pol.tr 82.222.167.141 host-82-222-167-141.reverse.superonline.net
877 mssql.manisa.pol.tr 82.222.167.141 host-82-222-167-141.reverse.superonline.net
878 ns.manisa.pol.tr 82.222.167.180 host-82-222-167-180.reverse.superonline.net
879 ns2.manisa.pol.tr 82.222.167.141 host-82-222-167-141.reverse.superonline.net
880 webmail.manisa.pol.tr 82.222.167.141 host-82-222-167-141.reverse.superonline.net
881#######################################################################################################################################
882http://www.manisa.pol.tr/ [200 OK] ASP_NET[4.0.30319][MVC5.2], Citrix-NetScaler, Cookies[ASP.NET_SessionId,NSC_ESNS], Country[UKRAINE][UA], HTML5, HTTPServer[Microsoft-IIS/10.0], HttpOnly[ASP.NET_SessionId], IP[2.58.141.4], Microsoft-IIS[10.0], Script[text/javascript], UncommonHeaders[x-aspnetmvc-version,x-via-nscopi], X-Powered-By[ASP.NET], X-UA-Compatible[IE=edge]
883#######################################################################################################################################
884Nmap scan report for 2.58.141.4
885Host is up (0.050s latency).
886Not shown: 995 filtered ports
887PORT STATE SERVICE VERSION
88825/tcp closed smtp
88980/tcp open tcpwrapped
890113/tcp closed ident
891139/tcp closed netbios-ssn
892445/tcp closed microsoft-ds
893#####################################################################################################################################
894http://www.manisa.pol.tr/ [200 OK] ASP_NET[4.0.30319][MVC5.2], Citrix-NetScaler, Cookies[ASP.NET_SessionId,NSC_ESNS], Country[UKRAINE][UA], HTML5, HTTPServer[Microsoft-IIS/10.0], HttpOnly[ASP.NET_SessionId], IP[2.58.141.4], Microsoft-IIS[10.0], Script[text/javascript], UncommonHeaders[x-aspnetmvc-version,x-via-nscopi], X-Powered-By[ASP.NET], X-UA-Compatible[IE=edge]
895######################################################################################################################################
896
897Domains still to check: 1
898 Checking if the hostname manisa.pol.tr. given is in fact a domain...
899
900Analyzing domain: manisa.pol.tr.
901 Checking NameServers using system default resolver...
902 IP: 82.222.167.141 (Turkey)
903 HostName: ns2.manisa.pol.tr Type: NS
904 HostName: host-82-222-167-141.reverse.superonline.net Type: PTR
905 IP: 82.222.167.180 (Turkey)
906 HostName: ns.manisa.pol.tr Type: NS
907 HostName: host-82-222-167-180.reverse.superonline.net Type: PTR
908
909 Checking MailServers using system default resolver...
910 IP: 82.222.167.141 (Turkey)
911 HostName: ns2.manisa.pol.tr Type: NS
912 HostName: host-82-222-167-141.reverse.superonline.net Type: PTR
913 HostName: mail.manisa.pol.tr Type: MX
914
915 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
916 No zone transfer found on nameserver 82.222.167.180
917 No zone transfer found on nameserver 82.222.167.141
918
919 Checking SPF record...
920 No SPF record
921
922 Checking 192 most common hostnames using system default resolver...
923 IP: 2.58.141.4 (Turkey)
924 HostName: www.manisa.pol.tr. Type: A
925 IP: 2.58.141.4 (Turkey)
926 HostName: www.manisa.pol.tr. Type: A
927 HostName: ftp.manisa.pol.tr. Type: A
928 IP: 82.222.167.141 (Turkey)
929 HostName: ns2.manisa.pol.tr Type: NS
930 HostName: host-82-222-167-141.reverse.superonline.net Type: PTR
931 HostName: mail.manisa.pol.tr Type: MX
932 HostName: mail.manisa.pol.tr. Type: A
933 IP: 82.222.167.141 (Turkey)
934 HostName: ns2.manisa.pol.tr Type: NS
935 HostName: host-82-222-167-141.reverse.superonline.net Type: PTR
936 HostName: mail.manisa.pol.tr Type: MX
937 HostName: mail.manisa.pol.tr. Type: A
938 HostName: mssql.manisa.pol.tr. Type: A
939 IP: 82.222.167.180 (Turkey)
940 HostName: ns.manisa.pol.tr Type: NS
941 HostName: host-82-222-167-180.reverse.superonline.net Type: PTR
942 HostName: ns.manisa.pol.tr. Type: A
943 IP: 82.222.167.141 (Turkey)
944 HostName: ns2.manisa.pol.tr Type: NS
945 HostName: host-82-222-167-141.reverse.superonline.net Type: PTR
946 HostName: mail.manisa.pol.tr Type: MX
947 HostName: mail.manisa.pol.tr. Type: A
948 HostName: mssql.manisa.pol.tr. Type: A
949 HostName: ns2.manisa.pol.tr. Type: A
950 IP: 82.222.167.141 (Turkey)
951 HostName: ns2.manisa.pol.tr Type: NS
952 HostName: host-82-222-167-141.reverse.superonline.net Type: PTR
953 HostName: mail.manisa.pol.tr Type: MX
954 HostName: mail.manisa.pol.tr. Type: A
955 HostName: mssql.manisa.pol.tr. Type: A
956 HostName: ns2.manisa.pol.tr. Type: A
957 HostName: webmail.manisa.pol.tr. Type: A
958
959 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
960 Checking netblock 82.222.167.0
961 Checking netblock 2.58.141.0
962
963 Searching for manisa.pol.tr. emails in Google
964
965 Checking 3 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
966 Host 82.222.167.180 is up (reset ttl 64)
967 Host 82.222.167.141 is up (reset ttl 64)
968 Host 2.58.141.4 is up (reset ttl 64)
969
970 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
971 Scanning ip 82.222.167.180 (ns.manisa.pol.tr.):
972 Scanning ip 82.222.167.141 (webmail.manisa.pol.tr.):
973 80/tcp open http syn-ack ttl 233 Microsoft IIS httpd 7.5
974 | http-methods:
975 | Supported Methods: OPTIONS TRACE GET HEAD POST
976 |_ Potentially risky methods: TRACE
977 |_http-title: Not Found
978 443/tcp open ssl/https? syn-ack ttl 232
979 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
980 Scanning ip 2.58.141.4 (ftp.manisa.pol.tr.):
981 80/tcp open tcpwrapped syn-ack ttl 236
982 WebCrawling domain's web servers... up to 50 max links.
983
984 + URL to crawl: http://ns2.manisa.pol.tr.
985 + Date: 2019-10-14
986
987 + Crawling URL: http://ns2.manisa.pol.tr.:
988 + Links:
989 + Crawling http://ns2.manisa.pol.tr. (400 Bad Request)
990 + Searching for directories...
991 + Searching open folders...
992
993
994 + URL to crawl: http://ns2.manisa.pol.tr
995 + Date: 2019-10-14
996
997 + Crawling URL: http://ns2.manisa.pol.tr:
998 + Links:
999 + Crawling http://ns2.manisa.pol.tr
1000 + Searching for directories...
1001 + Searching open folders...
1002
1003
1004 + URL to crawl: http://mail.manisa.pol.tr
1005 + Date: 2019-10-14
1006
1007 + Crawling URL: http://mail.manisa.pol.tr:
1008 + Links:
1009 + Crawling http://mail.manisa.pol.tr (404 Not Found)
1010 + Searching for directories...
1011 + Searching open folders...
1012
1013
1014 + URL to crawl: http://mssql.manisa.pol.tr.
1015 + Date: 2019-10-14
1016
1017 + Crawling URL: http://mssql.manisa.pol.tr.:
1018 + Links:
1019 + Crawling http://mssql.manisa.pol.tr. (400 Bad Request)
1020 + Searching for directories...
1021 + Searching open folders...
1022
1023
1024 + URL to crawl: http://mail.manisa.pol.tr.
1025 + Date: 2019-10-14
1026
1027 + Crawling URL: http://mail.manisa.pol.tr.:
1028 + Links:
1029 + Crawling http://mail.manisa.pol.tr. (400 Bad Request)
1030 + Searching for directories...
1031 + Searching open folders...
1032
1033
1034 + URL to crawl: http://webmail.manisa.pol.tr.
1035 + Date: 2019-10-14
1036
1037 + Crawling URL: http://webmail.manisa.pol.tr.:
1038 + Links:
1039 + Crawling http://webmail.manisa.pol.tr. (400 Bad Request)
1040 + Searching for directories...
1041 + Searching open folders...
1042
1043--Finished--
1044Summary information for domain manisa.pol.tr.
1045-----------------------------------------
1046
1047 Domain Ips Information:
1048 IP: 82.222.167.180
1049 HostName: ns.manisa.pol.tr Type: NS
1050 HostName: host-82-222-167-180.reverse.superonline.net Type: PTR
1051 HostName: ns.manisa.pol.tr. Type: A
1052 Country: Turkey
1053 Is Active: True (reset ttl 64)
1054 IP: 82.222.167.141
1055 HostName: ns2.manisa.pol.tr Type: NS
1056 HostName: host-82-222-167-141.reverse.superonline.net Type: PTR
1057 HostName: mail.manisa.pol.tr Type: MX
1058 HostName: mail.manisa.pol.tr. Type: A
1059 HostName: mssql.manisa.pol.tr. Type: A
1060 HostName: ns2.manisa.pol.tr. Type: A
1061 HostName: webmail.manisa.pol.tr. Type: A
1062 Country: Turkey
1063 Is Active: True (reset ttl 64)
1064 Port: 80/tcp open http syn-ack ttl 233 Microsoft IIS httpd 7.5
1065 Script Info: | http-methods:
1066 Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
1067 Script Info: |_ Potentially risky methods: TRACE
1068 Script Info: |_http-title: Not Found
1069 Port: 443/tcp open ssl/https? syn-ack ttl 232
1070 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1071 IP: 2.58.141.4
1072 HostName: www.manisa.pol.tr. Type: A
1073 HostName: ftp.manisa.pol.tr. Type: A
1074 Country: Turkey
1075 Is Active: True (reset ttl 64)
1076 Port: 80/tcp open tcpwrapped syn-ack ttl 236
1077#######################################################################################################################################
1078dnsenum VERSION:1.2.4
1079
1080----- www.manisa.pol.tr -----
1081
1082
1083Host's addresses:
1084__________________
1085
1086manisa.pol.tr. 896 IN A 2.58.141.4
1087
1088
1089Name Servers:
1090______________
1091
1092ns.manisa.pol.tr. 39523 IN A 82.222.167.180
1093ns2.manisa.pol.tr. 7123 IN A 82.222.167.141
1094
1095
1096Mail (MX) Servers:
1097___________________
1098
1099mail.manisa.pol.tr. 10800 IN A 82.222.167.141
1100
1101
1102Trying Zone Transfers and getting Bind Versions:
1103_________________________________________________
1104
1105
1106Trying Zone Transfer for www.manisa.pol.tr on ns.manisa.pol.tr ...
1107
1108Trying Zone Transfer for www.manisa.pol.tr on ns2.manisa.pol.tr ...
1109
1110brute force file not specified, bay.
1111######################################################################################################################################
1112[*] Processing domain www.manisa.pol.tr
1113[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a', '192.168.0.1']
1114[+] Getting nameservers
111582.222.167.180 - ns.manisa.pol.tr
111682.222.167.141 - ns2.manisa.pol.tr
1117[-] Zone transfer failed
1118
1119[+] MX records found, added to target list
112010 mail.manisa.pol.tr.
1121
1122[*] Scanning www.manisa.pol.tr for A records
11232.58.141.4 - www.manisa.pol.tr
1124
1125######################################################################################################################################
1126[+] www.manisa.pol.tr has no SPF record!
1127[*] No DMARC record found. Looking for organizational record
1128[+] No organizational DMARC record
1129[+] Spoofing possible for www.manisa.pol.tr!
1130#######################################################################################################################################
1131Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-15 00:29 EDT
1132Nmap scan report for www.manisa.pol.tr (2.58.141.4)
1133Host is up (0.19s latency).
1134Not shown: 995 filtered ports, 4 closed ports
1135Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
1136PORT STATE SERVICE
113780/tcp open http
1138
1139Nmap done: 1 IP address (1 host up) scanned in 489.50 seconds
1140#######################################################################################################################################
1141Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-15 00:37 EDT
1142Nmap scan report for www.manisa.pol.tr (2.58.141.4)
1143Host is up (0.29s latency).
1144Not shown: 2 filtered ports
1145PORT STATE SERVICE
114653/udp open|filtered domain
114767/udp open|filtered dhcps
114868/udp open|filtered dhcpc
114969/udp open|filtered tftp
115088/udp open|filtered kerberos-sec
1151123/udp open|filtered ntp
1152139/udp open|filtered netbios-ssn
1153161/udp open|filtered snmp
1154162/udp open|filtered snmptrap
1155389/udp open|filtered ldap
1156500/udp open|filtered isakmp
1157520/udp open|filtered route
11582049/udp open|filtered nfs
1159
1160Nmap done: 1 IP address (1 host up) scanned in 7.55 seconds
1161#######################################################################################################################################
1162HTTP/1.1 200 OK
1163Cache-Control: private, no-store, max-age=180
1164X-Via-NSCOPI: 1.0
1165Transfer-Encoding: chunked
1166Content-Type: text/html; charset=utf-8
1167Expires: Tue, 15 Oct 2019 04:41:06 GMT
1168Last-Modified: Tue, 15 Oct 2019 04:38:06 GMT
1169Vary: *
1170Server: Microsoft-IIS/10.0
1171Set-Cookie: ASP.NET_SessionId=5vj5e2a5c4lbvm35ktna3331; path=/; HttpOnly
1172X-AspNetMvc-Version: 5.2
1173X-AspNet-Version: 4.0.30319
1174X-Powered-By: ASP.NET
1175Date: Tue, 15 Oct 2019 04:38:06 GMT
1176Set-Cookie: NSC_ESNS=7d60629a-4d1c-1da5-9678-ba8b1843e7c4_2592028206_0424834152_00000000019283299878; Path=/; Expires=Tue, 15-Oct-2019 04:38:21 GMT
1177Cache-Control: no-cache
1178
1179Allow: OPTIONS, TRACE, GET, HEAD, POST
1180#######################################################################################################################################
1181 div.innerHTML = '<!--[if gt IE ' + (++v) + ']><i></i><![endif]-->',
1182 <!-- Türkiye Haritası topbar alanının dışına eklendi.-->
1183 <!-- Mobil menü içeriği valilikler için güncellendi-->
1184######################################################################################################################################
1185//
1186application/json
1187/Areas/WebPart/Contents/EFooter/css/EFooter.css
1188/Areas/WebPart/Contents/EFooter/js/EFooter.js
1189/Areas/WebPart/Contents/ERadioCard/js/mediaelement-and-player-lang-tr.js
1190/Areas/WebPart/Contents/ERadioCard/js/mediaelement-and-player.min.js
1191/Areas/WebPart/Contents/ESocialMediaTwitter/js/moment.js
1192/Areas/WebPart/Contents/ESocialMediaTwitter/js/twitterFetcher_min.js
1193/Areas/WebPart/Contents/ValilikHeader/css/v1header.css
1194/Areas/WebPart/Contents/ValilikHeader/js/v1header.js
1195/Areas/WebPart/Contents/ValilikHeader/svg/
1196background:#EEE url(/Content/Common/min-ie9-img.png) center no-repeat; position:absolute; left:0; right:0; bottom:0; top:0; z-index:100000;
1197/clm10
1198<div class='navbar-header'>MANİSA EMNİYET MÜDÜRLÜĞÜ<i class='icon-close'></i></div>
1199<div class='navbar-search'><div class='input-group'><div class='input-group-prepend'><span class='input-group-text'><i class='icon-search'></i></span></div><input class='form-control' type='text' placeholder='Lütfen aramak istediğiniz kelimeyi yazınız.'/><div class='input-group-append'><span class='input-group-text'>Ara</span></div></div></div>
1200https://fonts.googleapis.com/css?family=Roboto&subset=latin-ext
1201https://twitter.com/manisa_pol_tr
1202https://www.facebook.com/manisa.pol.tr
1203http://www.manisa.pol.tr
1204http://www.w3.org/1999/xlink
1205/Icerik/css?v=OPZ4yxrNaPzWEKRih6_2ceq24FELJMoiJoh8-0CrrSQ1
1206/Icerik/js?v=uLMxMUc6UuRCtKybZUqZ9KZ-dGQSbwHKMsCpdNF6jMA1
1207/ISAYWebPart/Announcement/AnnouncementDahaFazlaYukle
1208/ISAYWebPart/Announcement/AnnouncementFilter
1209/ISAYWebPart/FSlider/FSliderContent
1210/ISAYWebPart/ValilikHeader/GetHavaDurumu
1211/ISAYWebPart/ValilikHeader/IlHaritaGetir
1212/kurumlar/isay.gov.tr/Egm/afad_logo.png
1213/kurumlar/isay.gov.tr/Egm/cimer.png
1214/kurumlar/isay.gov.tr/Egm/Goc_idaresi.png
1215/kurumlar/isay.gov.tr/Egm/JANDARMA.png
1216/kurumlar/isay.gov.tr/Egm/sahil_guvenlik.png
1217/WebPart/Announcement-css?v=bey2yifbJmazQt0Hi_Ub2ftdwRNKVhvHZyuEbR-0Srs1
1218/WebPart/Announcement-js?v=fIodgeyNcMRqM_tjuJUlrNwxdIwPNvr5_MrFL-QCLPg1
1219/WebPart/ELinkList-css?v=QWPpyzTBzwioa8nGhdfC0Sn_B_3HPEdEti8ORZr_6Uk1
1220/WebPart/ELinkList-js?v=7-Ylood5yPM88rG-rvgPsT9MjUoQXQU66R9fOvplgyU1
1221/WebPart/ERadioCard-css?v=M8dHn_way17PkR6VsX37y59anP-OlX8VbMoABr1gPYQ1
1222/WebPart/ERadioCard-js?v=u2wtvZu50UVL28T3nIfSDwf3ooCszacsPotpE-QPAXE1
1223/WebPart/ESocialMediaTwitter-css?v=y2X2pquLvZLXXbPZxk0X6gTXWP81tHTt1I4DBsy94bs1
1224/WebPart/ESocialMediaTwitter-js?v=m-0-ddXv9-l4b2GWiTFGFFLe35q2Dp5a4DgUoEtlrn41
1225/WebPart/FSlider-css?v=RSZigIGfhKaohuGGo4LqrvXh_b3mofobziyJ2PMis0Y1
1226/WebPart/FSlider-js?v=_WH9MU17HEz_sVAZ1L-cV4usC7ovrpnpwNV7wBJFqUQ1
1227/WebPart/QuickList-css?v=tjKjA68YCSMoXqb_E5B0sxeUPmkEb2DSYbFXBoZgIrU1
1228/WebPart/QuickList-js?v=WeQ9cDgHrbrRCSLbHJhrMPX15uvggasTr6m4ctndGlw1
1229/WebPart/section-header-css?v=8-IxQ3JeR7j48t5eivgCqrGjQ9UFd3ROcpaNsNBlZJ41
1230/WebPart/SliderNews-css?v=Mm1HEGI3OIMFeTkKqrHV0Jb8ddKVAuOKEw3m38xP2sg1
1231/WebPart/SliderNews-js?v=QkM7Y48_NK6nEgL-fgWaT_oaurhfqfKjifnW1JyfnQI1
1232/WebPart/WarningCard-css?v=Ax4MkRcGSi2v0jQXd1QDMoQjggjF7vno4C9A4dDlM4o1
1233/WebPart/WarningCard-js?v=GCzUFAH20NF8vOP_J9NNwOk0rwPnb1sLpBTeDyQd5mM1
1234/WebPart/webPartBaslik-js?v=igef0hxTL4LW1vZeTrMF0RUZVjMtDnqpnM3LJPjNz1w1
1235//www.manisa.pol.tr/alo-140-teror-ihbar-hatti23
1236//www.manisa.pol.tr/bilgi-edinme
1237//www.manisa.pol.tr/duyurular
1238//www.manisa.pol.tr/haberler
1239//www.manisa.pol.tr/ilce-emniyet-mudurlukleri
1240//www.manisa.pol.tr/il-emniyet-mudurumuz-sayin-omer-uslusoy
1241//www.manisa.pol.tr/iletisim-bilgileri
1242//www.manisa.pol.tr/kamu-hizmetleri
1243//www.manisa.pol.tr/kolluk-etik-ilkeleri
1244//www.manisa.pol.tr/yonet
1245#######################################################################################################################################
1246http://www.manisa.pol.tr [200 OK] ASP_NET[4.0.30319][MVC5.2], Citrix-NetScaler, Cookies[ASP.NET_SessionId,NSC_ESNS], Country[UKRAINE][UA], HTML5, HTTPServer[Microsoft-IIS/10.0], HttpOnly[ASP.NET_SessionId], IP[2.58.141.4], Microsoft-IIS[10.0], Script[text/javascript], UncommonHeaders[x-aspnetmvc-version,x-via-nscopi], X-Powered-By[ASP.NET], X-UA-Compatible[IE=edge]
1247#######################################################################################################################################
1248
1249wig - WebApp Information Gatherer
1250
1251
1252Scanning http://www.manisa.pol.tr...
1253__________________________ SITE INFO __________________________
1254IP Title
12552.58.141.4
1256
1257___________________________ VERSION ___________________________
1258Name Versions Type
1259ASP.NET 4.0.30319 Platform
1260IIS 10.0 Platform
1261
1262_________________________ INTERESTING _________________________
1263URL Note Type
1264/robots.txt robots.txt index Interesting
1265/changelog.aspx ChangeLog text file Interesting
1266/readme.aspx Readme file Interesting
1267/install.aspx Installation file Interesting
1268/test.aspx Test file Interesting
1269/login.aspx Login Page Interesting
1270/test1.aspx Test file Interesting
1271/test/ Test directory Interesting
1272/old.aspx This might be interesting Interesting
1273/old/ This might be interesting Interesting
1274/sql/ This might be interesting Interesting
1275
1276_______________________________________________________________
1277Time: 991.2 sec Urls: 632 Fingerprints: 40401
1278######################################################################################################################################
1279Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-15 00:55 EDT
1280NSE: Loaded 163 scripts for scanning.
1281NSE: Script Pre-scanning.
1282Initiating NSE at 00:55
1283Completed NSE at 00:55, 0.00s elapsed
1284Initiating NSE at 00:55
1285Completed NSE at 00:55, 0.00s elapsed
1286Initiating Parallel DNS resolution of 1 host. at 00:55
1287Completed Parallel DNS resolution of 1 host. at 00:55, 0.02s elapsed
1288Initiating SYN Stealth Scan at 00:55
1289Scanning www.manisa.pol.tr (2.58.141.4) [1 port]
1290Discovered open port 80/tcp on 2.58.141.4
1291Completed SYN Stealth Scan at 00:55, 0.22s elapsed (1 total ports)
1292Initiating Service scan at 00:55
1293Scanning 1 service on www.manisa.pol.tr (2.58.141.4)
1294Completed Service scan at 00:55, 6.33s elapsed (1 service on 1 host)
1295Initiating OS detection (try #1) against www.manisa.pol.tr (2.58.141.4)
1296Retrying OS detection (try #2) against www.manisa.pol.tr (2.58.141.4)
1297Initiating Traceroute at 00:55
1298Completed Traceroute at 00:55, 3.00s elapsed
1299Initiating Parallel DNS resolution of 8 hosts. at 00:55
1300Completed Parallel DNS resolution of 8 hosts. at 00:55, 0.38s elapsed
1301NSE: Script scanning 2.58.141.4.
1302Initiating NSE at 00:55
1303Completed NSE at 00:59, 232.32s elapsed
1304Initiating NSE at 00:59
1305Completed NSE at 00:59, 1.36s elapsed
1306Nmap scan report for www.manisa.pol.tr (2.58.141.4)
1307Host is up (0.16s latency).
1308
1309PORT STATE SERVICE VERSION
131080/tcp open http Microsoft IIS httpd 10.0
1311| http-brute:
1312|_ Path "/" does not require authentication
1313|_http-chrono: ERROR: Script execution failed (use -d to debug)
1314|_http-csrf: Couldn't find any CSRF vulnerabilities.
1315|_http-date: Tue, 15 Oct 2019 04:55:30 GMT; -2s from local time.
1316|_http-devframework: ASP.NET detected. Found related header.
1317|_http-dombased-xss: Couldn't find any DOM based XSS.
1318|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
1319|_http-errors: Couldn't find any error pages.
1320|_http-feed: Couldn't find any feeds.
1321|_http-fetch: Please enter the complete path of the directory to save data in.
1322| http-headers:
1323| Cache-Control: private, no-store, max-age=180
1324| X-Via-NSCOPI: 1.0
1325| Transfer-Encoding: chunked
1326| Content-Type: text/html; charset=utf-8
1327| Expires: Tue, 15 Oct 2019 04:58:33 GMT
1328| Last-Modified: Tue, 15 Oct 2019 04:55:33 GMT
1329| Vary: *
1330| Server: Microsoft-IIS/10.0
1331| Set-Cookie: ASP.NET_SessionId=yzooe2urrlk51telwfrliz0m; path=/; HttpOnly
1332| X-AspNetMvc-Version: 5.2
1333| X-AspNet-Version: 4.0.30319
1334| X-Powered-By: ASP.NET
1335| Date: Tue, 15 Oct 2019 04:55:33 GMT
1336| Set-Cookie: NSC_ESNS=7d6488cb-5133-1da5-9678-ba8b1843e7c4_0174265419_2303604760_00000000019283368800; Path=/; Expires=Tue, 15-Oct-2019 04:55:48 GMT
1337| Cache-Control: no-cache
1338|
1339|_ (Request type: HEAD)
1340|_http-jsonp-detection: Couldn't find any JSONP endpoints.
1341| http-methods:
1342| Supported Methods: OPTIONS TRACE GET HEAD POST
1343|_ Potentially risky methods: TRACE
1344|_http-mobileversion-checker: No mobile version detected.
1345| http-php-version: Logo query returned unknown hash b53adc79e689216ca763d749d2033ef3
1346|_Credits query returned unknown hash 0620150ccf9431dc8dc063ad78194b46
1347| http-robots.txt: 5 disallowed entries
1348| /kullanicilar /ortak_icerik /kurumlar /Kurumlar
1349|_/Kullanicilar
1350| http-security-headers:
1351| Cache_Control:
1352| Header: Cache-Control: private, no-store, max-age=180, no-cache
1353| Expires:
1354|_ Header: Expires: Tue, 15 Oct 2019 04:58:41 GMT
1355|_http-server-header: Microsoft-IIS/10.0
1356| http-sitemap-generator:
1357| Directory structure:
1358| Longest directory structure:
1359| Depth: 0
1360| Dir: /
1361| Total files found (by extension):
1362|_
1363|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
1364|_http-title: Site doesn't have a title (text/html; charset=utf-8).
1365| http-traceroute:
1366| last-modified
1367| Hop #1: Tue, 15 Oct 2019 04:55:35 GMT
1368| Hop #2: Tue, 15 Oct 2019 04:55:46 GMT
1369|_ Hop #3: Tue, 15 Oct 2019 04:55:48 GMT
1370| http-vhosts:
1371| www.manisa.pol.tr : 200
1372|_126 names had status 302
1373| http-waf-detect: IDS/IPS/WAF detected:
1374|_www.manisa.pol.tr:80/?p4yl04d3=<script>alert(document.cookie)</script>
1375| http-waf-fingerprint:
1376| Detected WAF
1377|_ Citrix Netscaler
1378|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
1379|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
1380|_http-xssed: No previously reported XSS vuln.
1381| vulscan: VulDB - https://vuldb.com:
1382| [8603] Microsoft Internet Explorer up to 10.0.9200.16540 XMLDOM information disclosure
1383| [40004] Microsoft DirectX up to 10.0 DirectShow quartz.dll memory corruption
1384| [33889] Microsoft Windows Media Player 10.00.00.4036 denial of service
1385| [139953] Microsoft Internet Explorer 10/11 memory corruption
1386| [139951] Microsoft Internet Explorer 10/11 Security Feature memory corruption
1387| [139935] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 NTFS privilege escalation
1388| [139912] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Hyper-V Network Switch denial of service
1389| [136321] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Audio Service privilege escalation
1390| [136279] Microsoft Internet Explorer 10/11 memory corruption
1391| [136275] Microsoft Windows 10/10 1607/10 1703/10 1709/Server 2016 Hyper-V memory corruption
1392| [136265] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1393| [134682] Microsoft Internet Explorer 10/11 memory corruption
1394| [134675] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1395| [133225] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1396| [133210] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 DirectX information disclosure
1397| [133208] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
1398| [133178] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1399| [133161] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1400| [131680] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1401| [131678] Microsoft Internet Explorer 10/11 memory corruption
1402| [131664] Microsoft Internet Explorer 10/11 Security Feature Security Zone privilege escalation
1403| [131650] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V denial of service
1404| [131639] Microsoft Internet Explorer 10/11 VBScript Engine memory corruption
1405| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1406| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1407| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
1408| [131618] Microsoft Internet Explorer 10/11 memory corruption
1409| [130827] Microsoft Internet Explorer 10/11 information disclosure
1410| [128722] Microsoft Windows 10 1803/Server 1803 DHCP Client memory corruption
1411| [128717] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V memory corruption
1412| [127881] Microsoft Windows 10 1809/Server 2019 Object denial of service
1413| [127827] Microsoft Windows 10 1809/Server 2019 DirectX information disclosure
1414| [127826] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Win32k ASLR privilege escalation
1415| [126733] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DirectX memory corruption
1416| [125112] Microsoft Windows 10 1803/Server 1803 Subsystem for Linux memory corruption
1417| [123867] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
1418| [123866] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
1419| [123848] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
1420| [123834] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1421| [122888] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Windows Shell privilege escalation
1422| [122862] Microsoft Internet Explorer 10/11 Cross-Frame information disclosure
1423| [122853] Microsoft Internet Explorer 10/11 Hyperlink privilege escalation
1424| [122846] Microsoft Internet Explorer 10/11 memory corruption
1425| [122826] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 PDF memory corruption
1426| [121102] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1427| [119471] Microsoft Windows 10 1803/Server 1803 Win32k privilege escalation
1428| [119466] Microsoft Windows 10 1709/Server 1709 Hyper-V denial of service
1429| [119453] Microsoft Windows 10 1709/10 1803/Server 1709/Server 1803 WebDAV denial of service
1430| [119450] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Kernel information disclosure
1431| [117496] Microsoft Internet Explorer 10/11 Chakra Scripting Engine information disclosure
1432| [116020] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Active Directory privilege escalation
1433| [115997] Microsoft Internet Explorer 10/11 memory corruption
1434| [116937] Microsoft Internet Explorer 10/11 Code Execution memory corruption
1435| [114567] Microsoft Internet Explorer 10/11 information disclosure
1436| [114565] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Kernel information disclosure
1437| [114534] Microsoft Windows 10/10 1511/10 1607/10 1703/10 1709 Scripting Host privilege escalation
1438| [114522] Microsoft Windows 10 1607/10 1703/Server 2016 Desktop Bridge privilege escalation
1439| [114520] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge privilege escalation
1440| [114517] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge VFS privilege escalation
1441| [113262] Microsoft Windows 10/Server 1709 Storage Services memory corruption
1442| [113261] Microsoft Windows 10/Server 1709 Security Feature privilege escalation
1443| [113259] Microsoft Windows 10/Server 1709/Server 2016 NTFS privilege escalation
1444| [113258] Microsoft Windows 10/Server 1709 Kernel information disclosure
1445| [113253] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
1446| [113251] Microsoft Windows 10/Server 1709 Kernel memory corruption
1447| [113250] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
1448| [113243] Microsoft Windows 10/Server 2016 MultiPoint Management privilege escalation
1449| [113240] Microsoft Windows 10/Server 1709/Server 2016 AppContainer privilege escalation
1450| [113238] Microsoft Windows 10 1709/Server 1709 Named Pipe File System privilege escalation
1451| [113221] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1452| [110532] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1453| [110531] Microsoft Windows 10/Server 2016 Device Guard privilege escalation
1454| [109365] Microsoft Internet Explorer 10/11 memory corruption
1455| [107753] Microsoft Windows 10/Server 2016 SMB privilege escalation
1456| [107734] Microsoft Windows 10/Server 2016 SMB privilege escalation
1457| [105049] Microsoft Windows 10 1703 Remote Desktop Protocol denial of service
1458| [105013] Microsoft Windows 10 1607/10 1703/Server 2016 Hyper-V denial of service
1459| [103442] Microsoft Windows 10/Server 2016 HoloLens WiFi Packet privilege escalation
1460| [102461] Microsoft Internet Explorer 10/11 memory corruption
1461| [101028] Microsoft Windows 10/Server 2016 Hyper-V vSMB privilege escalation
1462| [101007] Microsoft Internet Explorer 10/11 memory corruption
1463| [99683] Microsoft Windows 10 1607/10 1703/Server 2012 R2/Server 2016 Active Directory Lockout privilege escalation
1464| [99667] Microsoft Windows 10/Server 2016 Active Directory Service Unresponsive denial of service
1465| [98272] Microsoft Windows up to 10/Server 2016 Local Session privilege escalation
1466| [98015] Microsoft Windows 10/Server 2016 Hyper-V denial of service
1467| [98013] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
1468| [98007] Microsoft Windows 10/Server 2016 Hyper-V Network Switch denial of service
1469| [98006] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
1470| [97967] Microsoft Internet Explorer 10/11 memory corruption
1471| [97965] Microsoft Internet Explorer 10/11 memory corruption
1472| [94436] Microsoft Windows 10 Graphics memory corruption
1473| [94421] Microsoft Internet Explorer 10/11 information disclosure
1474| [94418] Microsoft Internet Explorer 10/11 privilege escalation
1475| [93427] Microsoft Internet Explorer 10/11 memory corruption
1476| [93266] Microsoft Internet Explorer 10 MSHTML GetPlainTextInScope memory corruption
1477| [92595] Microsoft Windows 10 Diagnostics Hub privilege escalation
1478| [92561] Microsoft Internet Explorer 10/11 privilege escalation
1479| [92560] Microsoft Internet Explorer 10/11 privilege escalation
1480| [92557] Microsoft Internet Explorer 10/11 memory corruption
1481| [91560] Microsoft Windows 10 Object denial of service
1482| [91517] Microsoft Internet Explorer 10/11 memory corruption
1483| [91516] Microsoft Internet Explorer 10/11 privilege escalation
1484| [90712] Microsoft Windows 10/10 1511 Universal Outlook information disclosure
1485| [90683] Microsoft Internet Explorer 10/11 information disclosure
1486| [89020] Microsoft Internet Explorer 10/11 information disclosure
1487| [89010] Microsoft Internet Explorer 10/11 memory corruption
1488| [87964] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
1489| [87952] Microsoft Windows 10/10 1511 Diagnostic Hub privilege escalation
1490| [87946] Microsoft Windows 10 Kernel win32k.sys privilege escalation
1491| [87139] Microsoft Internet Explorer 10/11 information disclosure
1492| [82246] Microsoft Internet Explorer 10/11 memory corruption
1493| [82234] Microsoft Windows 10 HTTP.sys HTTP Request denial of service
1494| [81271] Microsoft Windows 10 PDF Library memory corruption
1495| [81249] Microsoft Internet Explorer 10/11 memory corruption
1496| [81243] Microsoft Internet Explorer 10 memory corruption
1497| [80845] Microsoft Internet Explorer 10 memory corruption
1498| [80843] Microsoft Internet Explorer 10 memory corruption
1499| [80839] Microsoft Internet Explorer 10/11 DLL Loader memory corruption
1500| [80229] Microsoft Exchange Server 2013 CU 10/2013 CU 11/2013 SP1/2016 Outlook Web Access cross site scripting
1501| [80227] Microsoft Exchange Server 2013 CU 10/2013 SP1/2016 Outlook Web Access cross site scripting
1502| [80223] Microsoft Windows 10/1511 RDP Service weak authentication
1503| [79515] Microsoft Windows 10 Kernel memory corruption
1504| [79473] Microsoft Internet Explorer 10 memory corruption
1505| [79466] Microsoft Internet Explorer 10/11 memory corruption
1506| [79463] Microsoft Internet Explorer 10 memory corruption
1507| [79158] Microsoft Internet Explorer 10/11 memory corruption
1508| [79157] Microsoft Internet Explorer 10/11 memory corruption
1509| [79139] Microsoft Internet Explorer 10/11 memory corruption
1510| [78383] Microsoft Internet Explorer 10/11 privilege escalation
1511| [78382] Microsoft Internet Explorer 10 memory corruption
1512| [77643] Microsoft Internet Explorer 10/11 memory corruption
1513| [77597] Microsoft Internet Explorer 10/11 File denial of service
1514| [77596] Microsoft Internet Explorer 10/11 Process information disclosure
1515| [77007] Microsoft Internet Explorer 10 ASLR privilege escalation
1516| [77005] Microsoft Internet Explorer 10/11 memory corruption
1517| [76494] Microsoft Internet Explorer 10/11 JScript 9 memory corruption
1518| [76488] Microsoft Internet Explorer 10/11 File information disclosure
1519| [76487] Microsoft Internet Explorer 10/11 memory corruption
1520| [76475] Microsoft Internet Explorer 10/11 memory corruption
1521| [76436] Microsoft Internet Explorer 10/11 memory corruption
1522| [75781] Microsoft Internet Explorer 10/11 memory corruption
1523| [75777] Microsoft Internet Explorer 10 memory corruption
1524| [75767] Microsoft Internet Explorer 10/11 privilege escalation
1525| [75766] Microsoft Internet Explorer 10/11 memory corruption
1526| [75765] Microsoft Internet Explorer 10/11 memory corruption
1527| [75762] Microsoft Internet Explorer 10/11 memory corruption
1528| [75760] Microsoft Windows Media Player 10/11/12 DataObject memory corruption
1529| [75399] Trend Micro ScanMail for Microsoft Exchange up to 10.2/11.0 Session ID Generator weak authentication
1530| [75324] Microsoft Internet Explorer 10/11 memory corruption
1531| [74857] Microsoft Internet Explorer 10/11 memory corruption
1532| [73944] Microsoft Internet Explorer 10/11 memory corruption
1533| [73942] Microsoft Internet Explorer 10 memory corruption
1534| [69145] Microsoft Internet Explorer 10/11 ASLR privilege escalation
1535| [69144] Microsoft Internet Explorer 10/11 memory corruption
1536| [69141] Microsoft Internet Explorer 10/11 privilege escalation
1537| [69138] Microsoft Internet Explorer 10/11 memory corruption
1538| [69126] Microsoft Internet Explorer 10/11 memory corruption
1539| [69122] Microsoft Internet Explorer 10/11 memory corruption
1540| [69117] Microsoft Internet Explorer 10/11 memory corruption
1541| [69115] Microsoft Internet Explorer 10 memory corruption
1542| [69114] Microsoft Internet Explorer 10 memory corruption
1543| [68398] Microsoft Internet Explorer 10 memory corruption
1544| [68180] Microsoft Internet Explorer 10/11 privilege escalation
1545| [68179] Microsoft Internet Explorer 10/11 privilege escalation
1546| [68168] Microsoft Internet Explorer 10/11 memory corruption
1547| [67810] Microsoft Internet Explorer 10/11 memory corruption
1548| [67504] Microsoft Internet Explorer 10/11 memory corruption
1549| [67495] Microsoft Internet Explorer 10 memory corruption
1550| [67493] Microsoft Internet Explorer 10/11 memory corruption
1551| [67491] Microsoft Internet Explorer 10/11 memory corruption
1552| [67486] Microsoft Internet Explorer 10 memory corruption
1553| [67482] Microsoft Internet Explorer 10/11 memory corruption
1554| [67352] Microsoft Internet Explorer 10/11 memory corruption
1555| [67347] Microsoft Internet Explorer 10/11 memory corruption
1556| [67344] Microsoft Internet Explorer 10/11 memory corruption
1557| [67341] Microsoft Internet Explorer 10/11 memory corruption
1558| [67334] Microsoft Internet Explorer 10 memory corruption
1559| [67330] Microsoft Internet Explorer 10/11 memory corruption
1560| [67329] Microsoft Internet Explorer 10/11 memory corruption
1561| [67004] Microsoft Internet Explorer 10/11 memory corruption
1562| [13537] Microsoft Internet Explorer 10/11 memory corruption
1563| [13535] Microsoft Internet Explorer 10/11 memory corruption
1564| [13530] Microsoft Internet Explorer 10/11 memory corruption
1565| [13529] Microsoft Internet Explorer 10/11 memory corruption
1566| [13523] Microsoft Internet Explorer 10/11 memory corruption
1567| [13516] Microsoft Internet Explorer 10/11 memory corruption
1568| [13513] Microsoft Internet Explorer 10/11 memory corruption
1569| [13510] Microsoft Internet Explorer 10/11 memory corruption
1570| [13507] Microsoft Internet Explorer 10 memory corruption
1571| [13506] Microsoft Internet Explorer 10 memory corruption
1572| [13498] Microsoft Internet Explorer 10/11 memory corruption
1573| [13495] Microsoft Internet Explorer 10/11 information disclosure
1574| [13491] Microsoft Internet Explorer 10/11 memory corruption
1575| [12546] Microsoft Internet Explorer 10/11 memory corruption
1576| [12544] Microsoft Internet Explorer 10/11 memory corruption
1577| [12421] Apple Mac OS X 10.8.5 QuickLook Microsoft Office Document memory corruption
1578| [11435] Microsoft Internet Explorer 10/11 Permission privilege escalation
1579| [11433] Microsoft Internet Explorer 10 memory corruption
1580| [10625] Microsoft Internet Explorer 10 memory corruption
1581| [10624] Microsoft Internet Explorer 10 memory corruption
1582| [10621] Microsoft Internet Explorer 10 memory corruption
1583| [10620] Microsoft Internet Explorer 10 memory corruption
1584| [10219] Microsoft Internet Explorer 10 memory corruption
1585| [9813] Microsoft Internet Explorer up to 10 Garbage Collection jscript9.dll Recycler::ProcessMark information disclosure
1586| [9414] Microsoft Internet Explorer 10 Use-After-Free memory corruption
1587| [9411] Microsoft Internet Explorer 10 memory corruption
1588| [9097] Microsoft Internet Explorer 10 Use-After-Free memory corruption
1589| [9092] Microsoft Internet Explorer 10 MSHTML CEditAdorner::Detach memory corruption
1590| [9090] Microsoft Internet Explorer 10 memory corruption
1591| [8715] Microsoft Internet Explorer 10.x Use-After-Free memory corruption
1592| [7978] Microsoft Internet Explorer 10 Sandbox unknown vulnerability
1593| [8432] Microsoft Internet Explorer 10 HTML5 Engine localStorage denial of service
1594| [7104] Microsoft Internet Explorer up to 10 Mouse/Keyboard Activity edit.php fireEvent information disclosure
1595| [3247] Microsoft Media Player up to 10.x Skin Decompressor Heap-based cross site scripting
1596| [3246] Microsoft Media Player up to 10.x Skin Header Parser memory corruption
1597| [2724] Microsoft Windows up to 10 Media Player ASX Playlist Heap-based memory corruption
1598|
1599| MITRE CVE - https://cve.mitre.org:
1600| [CVE-2012-4591] About.aspx in the Portal in McAfee Enterprise Mobility Manager (EMM) before 10.0 discloses the name of the user account for an IIS worker process, which allows remote attackers to obtain potentially sensitive information by visiting this page.
1601| [CVE-2012-1945] Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
1602| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
1603| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
1604| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
1605| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
1606| [CVE-2012-1436] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \2D\6C\68 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1607| [CVE-2012-1435] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1608| [CVE-2012-1434] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1609| [CVE-2012-1433] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1610| [CVE-2012-1432] The Microsoft EXE file parser in Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
1611| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
1612| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
1613| [CVE-2010-1681] Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
1614| [CVE-2009-1016] Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to IIS. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow involving an unspecified Server Plug-in and a crafted SSL certificate.
1615| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
1616| [CVE-2009-0537] Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD
1617| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
1618| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
1619| [CVE-2008-2463] The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
1620| [CVE-2007-3901] Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
1621| [CVE-2007-3895] Buffer overflow in Microsoft DirectShow in Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted (1) WAV or (2) AVI file.
1622| [CVE-2006-6601] Windows Media Player 10.00.00.4036 in Microsoft Windows XP SP2 allows user-assisted remote attackers to cause a denial of service via a .MID (MIDI) file with a malformed header chunk without any track chunks, possibly involving (1) number of tracks of (2) time division fields that are set to 0.
1623| [CVE-2006-6134] Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
1624| [CVE-2004-1312] A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.
1625| [CVE-2013-4015] Microsoft Internet Explorer 6 through 10 allows local users to bypass the elevation policy check in the (1) Protected Mode or (2) Enhanced Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code.
1626| [CVE-2013-3166] Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via vectors involving incorrect auto-selection of the Shift JIS encoding, leading to cross-domain scrolling events, aka "Shift JIS Character Encoding Vulnerability," a different vulnerability than CVE-2013-0015.
1627| [CVE-2013-3163] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
1628| [CVE-2013-3162] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3115.
1629| [CVE-2013-3161] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3143.
1630| [CVE-2013-3153] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3148.
1631| [CVE-2013-3152] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3146.
1632| [CVE-2013-3151] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.
1633| [CVE-2013-3148] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153.
1634| [CVE-2013-3146] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
1635| [CVE-2013-3144] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.
1636| [CVE-2013-3143] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
1637| [CVE-2013-3142] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139.
1638| [CVE-2013-3139] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
1639| [CVE-2013-3126] Microsoft Internet Explorer 9 and 10, when script debugging is enabled, does not properly handle objects in memory during the processing of script, which allows remote attackers to execute arbitrary code via a crafted web site, aka "Internet Explorer Script Debug Vulnerability."
1640| [CVE-2013-3125] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3120.
1641| [CVE-2013-3123] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
1642| [CVE-2013-3121] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3139, and CVE-2013-3142.
1643| [CVE-2013-3120] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.
1644| [CVE-2013-3119] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3114.
1645| [CVE-2013-3118] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120 and CVE-2013-3125.
1646| [CVE-2013-3115] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162.
1647| [CVE-2013-3114] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3119.
1648| [CVE-2013-3113] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
1649| [CVE-2013-3112] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3113, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
1650| [CVE-2013-3111] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
1651| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
1652| [CVE-2013-2551] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
1653| [CVE-2013-1338] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1304.
1654| [CVE-2013-1312] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
1655| [CVE-2013-1309] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
1656| [CVE-2013-1308] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
1657| [CVE-2013-1304] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1338.
1658| [CVE-2013-1303] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1304 and CVE-2013-1338.
1659| [CVE-2013-0094] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."
1660| [CVE-2013-0093] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."
1661| [CVE-2013-0092] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."
1662| [CVE-2013-0090] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
1663| [CVE-2013-0089] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."
1664| [CVE-2013-0088] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."
1665| [CVE-2013-0087] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer OnResize Use After Free Vulnerability."
1666| [CVE-2013-0030] The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."
1667| [CVE-2013-0027] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CPasteCommand Use After Free Vulnerability."
1668| [CVE-2013-0023] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."
1669| [CVE-2013-0021] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
1670| [CVE-2013-0019] Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
1671| [CVE-2012-6502] Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a name-value pair from a local file via a \\127.0.0.1\C$\ sequence.
1672| [CVE-2012-5674] Unspecified vulnerability in Adobe ColdFusion 10 before Update 5, when Internet Information Services (IIS) is used, allows attackers to cause a denial of service via unknown vectors.
1673| [CVE-2012-4787] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
1674| [CVE-2012-4782] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability."
1675| [CVE-2012-4781] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."
1676| [CVE-2012-1876] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
1677| [CVE-2012-1545] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote attackers to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
1678| [CVE-2011-1417] Integer overflow in QuickLook, as used in Apple Mac OS X before 10.6.7 and MobileSafari in Apple iOS before 4.2.7 and 4.3.x before 4.3.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a Microsoft Office document with a crafted size field in the OfficeArtMetafileHeader, related to OfficeArtBlip, as demonstrated on the iPhone by Charlie Miller and Dion Blazakis during a Pwn2Own competition at CanSecWest 2011.
1679| [CVE-2011-0627] Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
1680| [CVE-2011-0208] QuickLook in Apple Mac OS X 10.6 before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office document.
1681| [CVE-2010-3785] Buffer overflow in QuickLook in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document.
1682| [CVE-2009-3032] Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
1683| [CVE-2009-2838] Integer overflow in QuickLook in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document that triggers a buffer overflow.
1684| [CVE-2009-0944] The Microsoft Office Spotlight Importer in Spotlight in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 does not properly validate Microsoft Office files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a file that triggers memory corruption.
1685| [CVE-2008-5745] Integer overflow in quartz.dll in the DirectShow framework in Microsoft Windows Media Player (WMP) 9, 10, and 11, including 11.0.5721.5260, allows remote attackers to cause a denial of service (application crash) via a crafted (1) WAV, (2) SND, or (3) MID file. NOTE: this has been incorrectly reported as a code-execution vulnerability. NOTE: it is not clear whether this issue is related to CVE-2008-4927.
1686| [CVE-2008-4211] Integer signedness error in (1) QuickLook in Apple Mac OS X 10.5.5 and (2) Office Viewer in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Microsoft Excel file that triggers an out-of-bounds memory access, related to "handling of columns."
1687| [CVE-2008-3697] An unspecified ISAPI extension in VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (IIS crash) via a malformed request.
1688| [CVE-2008-2325] QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."
1689| [CVE-2007-5861] Unspecified vulnerability in Spotlight in Apple Mac OS X 10.4.11 allows user-assisted attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted .XLS file that triggers memory corruption in the Microsoft Office Spotlight Importer.
1690| [CVE-2007-3576] ** DISPUTED ** Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar."
1691| [CVE-2007-3037] Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that causes a size mismatch between compressed and decompressed data and triggers a heap-based buffer overflow, aka "Windows Media Player Code Execution Vulnerability Parsing Skins."
1692| [CVE-2007-3035] Unspecified vulnerability in Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that is not properly handled during decompression, aka "Windows Media Player Code Execution Vulnerability Decompressing Skins."
1693| [CVE-2006-3992] Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.
1694| [CVE-2006-2058] Argument injection vulnerability in Avant Browser 10.1 Build 17 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.
1695| [CVE-2006-0935] Microsoft Word 2003 allows remote attackers to cause a denial of service (application crash) via a crafted file, as demonstrated by 101_filefuzz.
1696| [CVE-2006-0025] Stack-based buffer overflow in Microsoft Windows Media Player 9 and 10 allows remote attackers to execute arbitrary code via a PNG image with a large chunk size.
1697| [CVE-2006-0006] Heap-based buffer overflow in the bitmap processing routine in Microsoft Windows Media Player 7.1 on Windows 2000 SP4, Media Player 9 on Windows 2000 SP4 and XP SP1, and Media Player 10 on XP SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted bitmap (.BMP) file that specifies a size of 0 but contains additional data.
1698| [CVE-2006-0005] Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
1699| [CVE-2005-3568] db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING."
1700| [CVE-2005-2502] Buffer overflow in AppKit for Mac OS X 10.3.9 and 10.4.2, as used in applications such as TextEdit, allows external user-assisted attackers to execute arbitrary code via a crafted Microsoft Word file.
1701| [CVE-2005-1683] Buffer overflow in winword.exe 10.2627.6714 and earlier in Microsoft Word for the Macintosh, before SP3 for Word 2002, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted mcw file.
1702| [CVE-2005-0545] Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue has been disputed in a followup post.
1703| [CVE-2004-0204] Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
1704|
1705| SecurityFocus - https://www.securityfocus.com/bid/:
1706| [3471] Microsoft IE 5.1 for Mac OS X 10.1 Download Execution Vulnerability
1707|
1708| IBM X-Force - https://exchange.xforce.ibmcloud.com:
1709| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
1710| [66404] Microsoft Windows kernel-mode driver (win32k.sys) variant 10 privilege escalation
1711|
1712| Exploit-DB - https://www.exploit-db.com:
1713| [6124] Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
1714| [19103] HP HP-UX <= 10.34,Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3
1715|
1716| OpenVAS (Nessus) - http://www.openvas.org:
1717| [855384] Solaris Update for snmp/mibiisa 108870-36
1718| [855273] Solaris Update for snmp/mibiisa 108869-36
1719| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
1720|
1721| SecurityTracker - https://www.securitytracker.com:
1722| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
1723|
1724| OSVDB - http://www.osvdb.org:
1725| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
1726| [87262] Microsoft IIS FTP Command Injection Information Disclosure
1727| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
1728| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
1729| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
1730| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
1731| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
1732| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
1733| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
1734| [71856] Microsoft IIS Status Header Handling Remote Overflow
1735| [71671] Microsoft Windows afd.sys 120CFh IOCTL Handling Local DoS
1736| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
1737| [68570] Microsoft Office Excel Lotus 1-2-3 Workbook Parsing Remote Overflow
1738| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
1739| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
1740| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
1741| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
1742| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
1743| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
1744| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
1745| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
1746| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
1747| [60273] Microsoft Windows NT Virtual DOS Machine 16-bit Executable Permission Bypass Local Privilege Escalation
1748| [59892] Microsoft IIS Malformed Host Header Remote DoS
1749| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
1750| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
1751| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
1752| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
1753| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
1754| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
1755| [55269] Microsoft IIS Traversal GET Request Remote DoS
1756| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
1757| [53309] Microsoft Windows WINS 1Ch Registration Domain Controller Manipulation
1758| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
1759| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
1760| [52238] Microsoft IIS IDC Extension XSS
1761| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
1762| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
1763| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
1764| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
1765| [43451] Microsoft IIS HTTP Request Smuggling
1766| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
1767| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
1768| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
1769| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
1770| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
1771| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
1772| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
1773| [31607] Microsoft Visual Studio 1 TYPELIB MOVEABLE PURE .rc File Name Overflow
1774| [29444] Microsoft Excel Crafted Lotus 1-2-3 File Arbitrary Code Execution
1775| [29409] Microsoft Windows TCP 135 Crafted Packet Saturation DoS
1776| [28726] Microsoft Works Malformed Lotus 1-2-3 Spreadsheet DoS
1777| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
1778| [28132] Microsoft IE HTTP 1.1 URL Parsing Overflow
1779| [27152] Microsoft Windows IIS ASP Page Processing Overflow
1780| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
1781| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
1782| [21805] Microsoft IIS Crafted URL Remote DoS
1783| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
1784| [19996] Microsoft Windows 2000 Event ID 1704 Group Policy Failure
1785| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
1786| [17124] Microsoft IIS Malformed WebDAV Request DoS
1787| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
1788| [17122] Microsoft IIS Permission Weakness .COM File Upload
1789| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
1790| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
1791| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
1792| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
1793| [13760] Microsoft IIS Malformed URL Request DoS
1794| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
1795| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
1796| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
1797| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
1798| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
1799| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
1800| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
1801| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
1802| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
1803| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
1804| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
1805| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
1806| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
1807| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
1808| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
1809| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
1810| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
1811| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
1812| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
1813| [11257] Microsoft IIS Malformed GET Request DoS
1814| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
1815| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
1816| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
1817| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
1818| [9200] Microsoft IIS Unspecified XSS Variant
1819| [9199] Microsoft IIS shtml.dll XSS
1820| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
1821| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
1822| [7737] Microsoft IIS ASP Redirection Function XSS
1823| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
1824| [5851] Microsoft IIS Single Dot Source Code Disclosure
1825| [5736] Microsoft IIS Relative Path System Privilege Escalation
1826| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
1827| [5633] Microsoft IIS Invalid WebDAV Request DoS
1828| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
1829| [5584] Microsoft IIS URL Redirection Malformed Length DoS
1830| [5566] Microsoft IIS Form_VBScript.asp XSS
1831| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
1832| [4864] Microsoft IIS TRACK Logging Failure
1833| [4863] Microsoft IIS Active Server Page Header DoS
1834| [4791] Microsoft IIS Response Object DoS
1835| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
1836| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
1837| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
1838| [3500] Microsoft IIS fpcount.exe Remote Overflow
1839| [3341] Microsoft IIS Redirect Response XSS
1840| [3339] Microsoft IIS HTTP Error Page XSS
1841| [3338] Microsoft IIS Help File XSS
1842| [3328] Microsoft IIS FTP Status Request DoS
1843| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
1844| [3325] Microsoft IIS HTR ISAPI Overflow
1845| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
1846| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
1847| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
1848| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
1849| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
1850| [3231] Microsoft IIS Log Bypass
1851| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
1852| [1931] Microsoft IIS MIME Content-Type Header DoS
1853| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
1854| [1826] Microsoft IIS Domain Guest Account Disclosure
1855| [1824] Microsoft IIS FTP DoS
1856| [1804] Microsoft IIS Long Request Parsing Remote DoS
1857| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
1858| [1750] Microsoft IIS File Fragment Disclosure
1859| [1543] Microsoft NT/IIS Invalid URL Request DoS
1860| [1504] Microsoft IIS File Permission Canonicalization Bypass
1861| [1465] Microsoft IIS .htr Missing Variable DoS
1862| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
1863| [1322] Microsoft IIS Malformed .htr Request DoS
1864| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
1865| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
1866| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
1867| [1170] Microsoft IIS Escape Character URL Access Bypass
1868| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
1869| [1082] Microsoft IIS Domain Resolution Access Bypass
1870| [1041] Microsoft IIS Malformed HTTP Request Header DoS
1871| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
1872| [930] Microsoft IIS Shared ASP Cache Information Disclosure
1873| [929] Microsoft IIS FTP Server NLST Command Overflow
1874| [928] Microsoft IIS Long Request Log Evasion
1875| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
1876| [814] Microsoft IIS global.asa Remote Information Disclosure
1877| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
1878| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
1879| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
1880| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
1881| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
1882| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
1883| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
1884| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
1885| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
1886| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
1887| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
1888| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
1889| [473] Microsoft IIS Multiple .cnf File Information Disclosure
1890| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
1891| [470] Microsoft IIS Form_JScript.asp XSS
1892| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
1893| [436] Microsoft IIS Unicode Remote Command Execution
1894| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
1895| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
1896| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
1897| [308] Microsoft IIS Malformed File Extension URL DoS
1898| [285] Microsoft IIS repost.asp File Upload
1899| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
1900| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
1901| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
1902| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
1903| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
1904| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
1905| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
1906| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
1907| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
1908| [98] Microsoft IIS perl.exe HTTP Path Disclosure
1909| [97] Microsoft IIS ISM.DLL HTR Request Overflow
1910| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
1911| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
1912| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
1913| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
1914| [2] Microsoft IIS ExAir search.asp Direct Request DoS
1915| [96197] Microsoft Windows TCP/IP Stack Crafted ICMPv6 Packet Handling Remote DoS
1916| [96195] Microsoft Windows NAT Driver Crafted ICMP Packet Handling Remote Memory Corruption DoS
1917| [96194] Microsoft Windows Asynchronous RPC Request Handling Remote Code Execution
1918| [96193] Microsoft Windows Unicode Scripts Processor (USP10.DLL) Uniscribe Font Parsing Engine Unspecified Memory Corruption
1919| [96192] Microsoft IE EUC-JP Character Encoding XSS
1920| [96191] Microsoft IE Process Integrity Level Assignment Bypass
1921| [96190] Microsoft IE Unspecified Memory Corruption (2013-3199)
1922| [96189] Microsoft IE Unspecified Memory Corruption (2013-3194)
1923| [96188] Microsoft IE Unspecified Memory Corruption (2013-3193)
1924| [96187] Microsoft IE Unspecified Memory Corruption (2013-3191)
1925| [96186] Microsoft IE Unspecified Memory Corruption (2013-3190)
1926| [96185] Microsoft IE Unspecified Memory Corruption (2013-3189)
1927| [96184] Microsoft IE Unspecified Memory Corruption (2013-3188)
1928| [96183] Microsoft IE Unspecified Memory Corruption (2013-3187)
1929| [96182] Microsoft IE Unspecified Memory Corruption (2013-3184)
1930| [96181] Microsoft Active Directory Federation Services (AD FS) Open Endpoint Unspecified Account Information Disclosure
1931| [96180] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3196)
1932| [96179] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3197)
1933| [96178] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3198)
1934| [95826] Microsoft IE jscript9.dll Recycler::ProcessMark Function Garbage Collection Object Address Information Disclosure Weakness
1935| [95687] Microsoft IE Enhanced / Protected Mode Elevation Policy Check Bypass
1936| [95667] Microsoft Windows XP Wireless Preferred Network List (PNL) Remote Disclosure
1937| [95617] Microsoft IE 9 Status Bar Spoofing Weakness
1938| [95589] Microsoft Windows Mobile Wireless Preferred Network List (PNL) Remote Disclosure
1939| [95569] Microsoft DirectShow Runtime quartz.dll CWAVEStream::GetMaxSampleSize() Function Multiple Sound File Handling Divide-by-Zero DoS Weakness
1940| [94987] Microsoft Windows Defender Improper Pathname Handling Local Privilege Escalation
1941| [94986] Microsoft Windows Media Format Runtime Media File Handling Arbitrary Code Execution
1942| [94985] Microsoft Windows DirectShow GIF File Handling Memory Overwrite Arbitrary Code Execution
1943| [94984] Microsoft IE Shift JIS Character Encoding XSS
1944| [94983] Microsoft IE Unspecified Memory Corruption (2013-3115)
1945| [94982] Microsoft IE Unspecified Memory Corruption (2013-3164)
1946| [94981] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution (2013-3163)
1947| [94980] Microsoft IE Unspecified Memory Corruption (2013-3162)
1948| [94979] Microsoft IE Unspecified Memory Corruption (2013-3161)
1949| [94978] Microsoft IE Unspecified Memory Corruption (2013-3153)
1950| [94977] Microsoft IE Unspecified Memory Corruption (2013-3152)
1951| [94976] Microsoft IE Unspecified Memory Corruption (2013-3151)
1952| [94975] Microsoft IE Unspecified Memory Corruption (2013-3150)
1953| [94974] Microsoft IE Unspecified Memory Corruption (2013-3146)
1954| [94973] Microsoft IE Unspecified Memory Corruption (2013-3149)
1955| [94972] Microsoft IE Unspecified Memory Corruption (2013-3148)
1956| [94971] Microsoft IE Unspecified Memory Corruption (2013-3147)
1957| [94969] Microsoft IE Unspecified Memory Corruption (2013-3145)
1958| [94968] Microsoft IE Unspecified Memory Corruption (2013-3144)
1959| [94967] Microsoft IE Unspecified Memory Corruption (2013-3143)
1960| [94966] Microsoft Windows win32k.sys Memory Object Dereference Handling Local Privilege Escalation
1961| [94965] Microsoft Windows win32k.sys Memory Object Allocation Handling Local Privilege Escalation
1962| [94964] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
1963| [94963] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow DoS
1964| [94962] Microsoft Windows win32k.sys Memory Object Handling Local Information Disclosure
1965| [94961] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
1966| [94960] Microsoft Multiple Product TrueType Font (TTF) File Handling Arbitrary Code Execution
1967| [94959] Microsoft .NET Framework / Silverlight Multidimensional Arrays Small Structure Handling Arbitrary Code Execution
1968| [94958] Microsoft Silverlight NULL Pointer Handling Arbitrary Code Execution
1969| [94957] Microsoft .NET Framework Delegate Object Serialization Permission Validation Privilege Escalation
1970| [94956] Microsoft .NET Framework Small Structure Array Allocation Remote Code Execution
1971| [94955] Microsoft .NET Framework Anonymous Method Injection Reflection Objection Permission Validation Privilege Escalation
1972| [94954] Microsoft .NET Framework Delegate Reflection Bypass Reflection Objection Permission Validation Privilege Escalation
1973| [94507] Microsoft IE Infinite Loop DoS
1974| [94330] Microsoft Outlook S/MIME EmailAddress Attribute Mismatch Weakness
1975| [94127] Microsoft Office PNG File Handling Buffer Overflow
1976| [94126] Microsoft Windows Print Spooler Printer Deletion Memory Handling Local Privilege Escalation
1977| [94125] Microsoft Windows TCP/IP Driver TCP Connection Crafted Packet Handling Remote Integer Overflow DoS
1978| [94124] Microsoft Windows Kernel Page Fault System Call Handling Local Information Disclosure
1979| [94123] Microsoft IE Webpage Script Debugging Memory Corruption
1980| [94122] Microsoft IE Unspecified Memory Corruption (2013-3142)
1981| [94121] Microsoft IE Unspecified Memory Corruption (2013-3141)
1982| [94120] Microsoft IE Unspecified Memory Corruption (2013-3139)
1983| [94119] Microsoft IE Unspecified Memory Corruption (2013-3125)
1984| [94118] Microsoft IE Unspecified Memory Corruption (2013-3124)
1985| [94117] Microsoft IE Unspecified Memory Corruption (2013-3123)
1986| [94116] Microsoft IE Unspecified Memory Corruption (2013-3122)
1987| [94115] Microsoft IE Unspecified Memory Corruption (2013-3121)
1988| [94114] Microsoft IE Unspecified Memory Corruption (2013-3120)
1989| [94113] Microsoft IE Unspecified Memory Corruption (2013-3119)
1990| [94112] Microsoft IE Unspecified Memory Corruption (2013-3118)
1991| [94111] Microsoft IE Unspecified Memory Corruption (2013-3117)
1992| [94110] Microsoft IE Unspecified Memory Corruption (2013-3116)
1993| [94109] Microsoft IE Unspecified Memory Corruption (2013-3114)
1994| [94108] Microsoft IE Unspecified Memory Corruption (2013-3113)
1995| [94107] Microsoft IE Unspecified Memory Corruption (2013-3112)
1996| [94106] Microsoft IE Unspecified Memory Corruption (2013-3111)
1997| [94105] Microsoft IE Unspecified Memory Corruption (2013-3110)
1998| [93539] Microsoft Windows win32k.sys EPATHOBJ::pprFlattenRec / EPATHOBJ::bFlatten Functions Local Privilege Escalation
1999| [93396] Microsoft Malware Protection Engine Crafted File Scan Handling Memory Corruption
2000| [93320] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
2001| [93319] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
2002| [93318] Microsoft Windows DirectX Graphics Kernel Subsystem (dxgkrnl.sys) Memory Object Handling Local Privilege Escalation
2003| [93317] Microsoft Windows Essentials Windows Writer Crafted URL Handling Arbitrary File Overwrite
2004| [93316] Microsoft Visio File Handling External Entity (XXE) Data Parsing Arbitrary File Access
2005| [93315] Microsoft Office Word DOC File Shape Data Handling Arbitrary Code Execution
2006| [93314] Microsoft Office Publisher PUB File Handling Buffer Underflow
2007| [93313] Microsoft Office Publisher PUB File Pointer Handling Arbitrary Code Execution
2008| [93312] Microsoft Office Publisher PUB File Signed Integer Handling Arbitrary Code Execution
2009| [93311] Microsoft Office Publisher PUB File Incorrect NULL Value Handling Arbitrary Code Execution
2010| [93310] Microsoft Office Publisher PUB File Invalid Range Check Handling Arbitrary Code Execution
2011| [93309] Microsoft Office Publisher PUB File Return Value Validation Arbitrary Code Execution
2012| [93308] Microsoft Office Publisher PUB File Handling Buffer Overflow
2013| [93307] Microsoft Office Publisher PUB File Return Value Handling Arbitrary Code Execution
2014| [93306] Microsoft Office Publisher PUB File Corrupt Interface Pointer Handling Arbitrary Code Execution
2015| [93305] Microsoft Office Publisher PUB File Handling Integer Overflow
2016| [93304] Microsoft Office Publisher PUB File Negative Value Allocation Handling Arbitrary Code Execution
2017| [93303] Microsoft Lync Unspecified Use-after-free Arbitrary Code Execution
2018| [93302] Microsoft .NET Framework WCF Endpoint Authentication Unspecified Policy Requirement Weakness Authentication Bypass
2019| [93301] Microsoft .NET Framework XML File Signature Validation Spoofing Weakness
2020| [93300] Microsoft Windows HTTP Protocol Stack (HTTP.sys) Crafted HTTP Header Handling Infinite Loop Remote DoS
2021| [93298] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
2022| [93297] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1312)
2023| [93296] Microsoft IE textNode Style Computation Use-after-free Arbitrary Code Execution
2024| [93295] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1310)
2025| [93294] Microsoft IE CDispNode Use-after-free Arbitrary Code Execution
2026| [93293] Microsoft IE TransNavContext Object Handling Use-after-free Arbitrary Code Execution
2027| [93292] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1307)
2028| [93291] Microsoft IE Anchor Element Handling Use-after-free Arbitrary Code Execution
2029| [93290] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-0811)
2030| [93289] Microsoft IE Unspecified JSON Data File Information Disclosure
2031| [93081] Microsoft Security Essentials UninstallString Unquoted Search Path Local Privilege Escalation Weakness
2032| [93075] Forbes Magazine Microsoft Office 365 T-Mobile Router Admin Interface Default Password
2033| [93005] Microsoft IE MSXML XMLDOM Object Local File Enumeration
2034| [92993] Microsoft IE CGenericElement Object Handling Use-after-free Arbitrary Code Execution
2035| [92931] Microsoft System Center Operations Manager Web Console /InternalPages/ViewTypeManager.aspx Multiple Parameter XSS
2036| [92913] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1338)
2037| [92284] Microsoft IE localStorage Method History Manipulation Disk Consumption DoS
2038| [92257] Microsoft IE CSS Import Handling Remote DoS
2039| [92133] Microsoft Windows NTFS NULL Pointer Dereference Local Privilege Escalation
2040| [92132] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1292)
2041| [92131] Microsoft Windows win32k.sys Crafted Font File Handling DoS
2042| [92130] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1283)
2043| [92129] Microsoft Office HTML Sanitization Component Unspecified XSS
2044| [92128] Microsoft Antimalware Client Improper Pathname Handling Local Privilege Escalation Weakness
2045| [92127] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unspecified Local Memory Corruption
2046| [92126] Microsoft Windows Multiple Active Directory Components LDAP Crafted Query Handling Memory Consumption Remote DoS
2047| [92125] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1294)
2048| [92124] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1284)
2049| [92123] Microsoft SharePoint Server SharePoint Lists Access Control Handling Unspecified Information Disclosure
2050| [92122] Microsoft Windows Remote Desktop Client ActiveX (mstscax.dll) Use-after-free Arbitrary Code Execution
2051| [92121] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1304)
2052| [92120] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1303)
2053| [91696] Microsoft Windows Modern Mail Unspecified Spoofing Weakness
2054| [91269] Microsoft Windows 8 TrueType Font (TTF) Handling Unspecified DoS
2055| [91199] FFmpeg libavcodec msrledec.c msrle_decode_8_16_24_32 Function Microsoft RLE Data Processing DoS
2056| [91198] Microsoft IE Broker Process Variant Object Handling Sandbox Bypass Arbitrary Code Execution
2057| [91197] Microsoft IE vml.dll Vector Graphic Property Handling Integer Overflow
2058| [91196] Microsoft IE Broker Pop-up Window Handling Protected Mode Bypass (pwn2own)
2059| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
2060| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
2061| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
2062| [91157] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1287)
2063| [91156] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1286)
2064| [91155] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1285)
2065| [91154] Microsoft Office for Mac HTML5 Email Message Unspecified Content Tag Loading Information Disclosure
2066| [91153] Microsoft OneNote Buffer Size Validation ONE File Handling Information Disclosure
2067| [91152] Microsoft SharePoint Unspecified Remote Buffer Overflow DoS
2068| [91151] Microsoft SharePoint Unspecified Traversal Privilege Escalation
2069| [91150] Microsoft SharePoint Unspecified XSS
2070| [91149] Microsoft SharePoint Callback Function Unspecified URL Handling Privilege Escalation
2071| [91148] Microsoft Visio Viewer Unspecified Tree Object Type Confusion Visio File Handling Arbitrary Code Execution
2072| [91147] Microsoft Silverlight Application Handling Unspecified Double Dereference Arbitrary Code Execution
2073| [91146] Microsoft IE CTreeNode Unspecified Use-after-free Arbitrary Code Execution
2074| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
2075| [91144] Microsoft IE onBeforeCopy execCommand selectAll Event Handling Use-after-free Arbitrary Code Execution
2076| [91143] Microsoft IE GetMarkupPtr execCommand Print Event Handling Use-after-free Arbitrary Code Execution
2077| [91142] Microsoft IE CElement Unspecified Use-after-free Arbitrary Code Execution
2078| [91141] Microsoft IE CCaret Unspecified Use-after-free Arbitrary Code Execution
2079| [91140] Microsoft IE CMarkupBehaviorContext Object Handling Use-after-free Arbitrary Code Execution
2080| [91139] Microsoft IE saveHistory Onload Event Handler Event Handling Use-after-free Arbitrary Code Execution
2081| [91138] Microsoft IE OnResize / OnMove CElement::EnsureRecalcNotify() Function Use-after-free Arbitrary Code Execution
2082| [90933] Microsoft IE Arbitrary HTM File Execution
2083| [90257] Microsoft Windows Server 2003 ICACLS.EXE Permission Inheritance Weakness
2084| [90236] Microsoft Windows ZwSetInformationProcess() Function Process Priority Handling Local DoS
2085| [90166] Microsoft Windows Object Linking and Embedding (OLE) Automation Memory Allocation RTF File Handling Arbitrary Code Execution
2086| [90165] Microsoft Windows Win32.sys CSRSS Memory Object Handling Local Privilege Escalation
2087| [90164] Microsoft Windows TCP/IP Stack Crafted Connection Termination Packet (TCP PIN WAIT) Handling Remote DoS
2088| [90163] Microsoft Windows Memory Object Reference Count Handling Local Privilege Escalation
2089| [90162] Microsoft Windows Memory Object Handling Local Privilege Escalation (2013-1279)
2090| [90161] Microsoft Windows ApphelpCacheLookupEntry Function Memory Object Handling Local Privilege Escalation
2091| [90160] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1277)
2092| [90159] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1276)
2093| [90158] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1275)
2094| [90157] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1274)
2095| [90156] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1273)
2096| [90155] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1272)
2097| [90154] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1271)
2098| [90153] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1270)
2099| [90152] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1269)
2100| [90151] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1268)
2101| [90150] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1267)
2102| [90149] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1266)
2103| [90148] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1265)
2104| [90147] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1264)
2105| [90146] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1263)
2106| [90145] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1262)
2107| [90144] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1261)
2108| [90143] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1260)
2109| [90142] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1259)
2110| [90141] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1258)
2111| [90140] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1257)
2112| [90139] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1256)
2113| [90138] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1255)
2114| [90137] Microsoft Windows win32k.sys SfnINOUTSTYLECHANGE Function Memory Object Handling Local Privilege Escalation
2115| [90136] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1253)
2116| [90135] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1252)
2117| [90134] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1251)
2118| [90133] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1250)
2119| [90132] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1249)
2120| [90131] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1248)
2121| [90130] Microsoft .NET Framework Windows Form Object Creation Callback Function Arbitrary Code Execution
2122| [90129] Microsoft Windows NFS Server Read-only Share File Operation Handling Remote DoS
2123| [90128] Microsoft Windows Media Content Handling Arbitrary Code Execution
2124| [90127] Microsoft IE Vector Markup Language (VML) Buffer Allocation Memory Corruption
2125| [90126] Microsoft IE CHTML CSelectionManager Object Handling Use-after-free Arbitrary Code Execution
2126| [90125] Microsoft IE CObjectElement Object Handling Use-after-free Arbitrary Code Execution
2127| [90124] Microsoft IE CPasteCommand Use-after-free Arbitrary Code Execution
2128| [90123] Microsoft IE InsertElement Use-after-free Arbitrary Code Execution
2129| [90122] Microsoft IE SLayoutRun Use-after-free Arbitrary Code Execution
2130| [90121] Microsoft IE pasteHTML TextRange Object Handling Use-after-free Arbitrary Code Execution
2131| [90120] Microsoft IE CDispNode SVG Object Handling Use-after-free Arbitrary Code Execution
2132| [90119] Microsoft IE LsGetTrailInfo Use-after-free Arbitrary Code Execution
2133| [90118] Microsoft IE vtable Use-after-free Arbitrary Code Execution
2134| [90117] Microsoft IE CMarkup / CData Object Handling Use-after-free Arbitrary Code Execution
2135| [90116] Microsoft IE COmWindowProxy Use-after-free Arbitrary Code Execution
2136| [90115] Microsoft IE SetCapture Method Handling Use-after-free Arbitrary Code Execution
2137| [90114] Microsoft IE Shift JIS Character Encoding Information Disclosure
2138| [89619] Microsoft IE Proxy Server TCP Session Re-use Cross-user Information Disclosure Weakness
2139| [89618] Microsoft IE HTTP / Secure Request Handling Spoofing Weakness
2140| [89553] Microsoft IE SRC Attribute UNC Share Pathname Handling Arbitrary File Information Disclosure
2141| [89315] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
2142| [89164] Microsoft Lync User-Agent Header Handling Remote Arbitrary Command Execution
2143| [89157] Microsoft Windows IPv6 Router Advertisement (RA) Flooding Weakness
2144| [88968] Microsoft .NET Framework Replace() Function Open Data Protocol (OData) HTTP Request Parsing Remote DoS
2145| [88967] Microsoft Windows SSL/TLS Forced Downgrade MitM Weakness
2146| [88966] Microsoft Windows win32k.sys Window Broadcast Message Handling Local Privilege Escalation
2147| [88965] Microsoft .NET Framework Double Construction Privilege Escalation
2148| [88964] Microsoft .NET Framework System.DirectoryServices.Protocols.SortRequestControl.GetValue() Method this.keys.Length Parameter Heap Buffer Overflow
2149| [88963] Microsoft .NET Framework Windows Forms (WinForms) Component System.Drawing.Imaging.EncoderParameters.ConvertToMemory() Method this.param.Length Parameter Multiple Application Handling Heap Buffer Overflow
2150| [88962] Microsoft .NET Framework System Drawing Memory Pointer Handling CAS Bypass Information Disclosure
2151| [88961] Microsoft System Center Operations Manager Web Console /InternalPages/ExecuteTask.aspx __CALLBACKPARAM Parameter XSS
2152| [88960] Microsoft System Center Operations Manager Web Console Unspecified XSS (2013-0009)
2153| [88959] Microsoft XML Core Services Integer Truncation XML Handling Memory Corruption
2154| [88958] Microsoft XML Core Services Unspecified XSLT Handling Memory Corruption
2155| [88956] Microsoft Windows Printer Spooler Service Print Job Handling Memory Corruption
2156| [88837] Microsoft Office Excel Memory Corruption DoS
2157| [88836] Microsoft Windows Paint BMP Image Parsing Memory Corruption
2158| [88811] Microsoft Visio VSD File Parsing Memory Corruption
2159| [88774] Microsoft IE CDwnBindInfo Object Handling Use-after-free Arbitrary Code Execution
2160| [88575] Microsoft Windows NT NtAcceptConnectPort Spoofed LPC Port Request Arbitrary Process Hijacking Weakness
2161| [88539] Microsoft IE mshtml.dll Unclosed Tags Sequence Handling Overflow Arbitrary Code Execution
2162| [88357] Microsoft IE fireEvent() Method Mouse / Keyboard Activity Disclosure
2163| [88320] Microsoft Windows TrueType Font (TTF) Parsing Unspecified Arbitrary Code Execution
2164| [88319] Microsoft IE InjectHTMLStream Object Handling Use-after-free Arbitrary Code Execution
2165| [88318] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
2166| [88317] Microsoft IE Object Ref Counting Use-after-free Arbitrary Code Execution
2167| [88316] Microsoft Windows OpenType Font (OTF) Parsing Unspecified Arbitrary Code Execution
2168| [88315] Microsoft Office Word RTF listoverridecount Element Handling Remote Code Execution
2169| [88314] Microsoft Exchange Server RSS Feed Handling Unspecified Remote DoS
2170| [88313] Microsoft Windows KERNEL32.DLL Filename Parsing Memory Corruption Privilege Escalation
2171| [88312] Microsoft Windows DirectPlay Office File Handling Heap Overflow
2172| [88311] Microsoft IP-HTTPS Component Revoked Certificate Restriction Bypass
2173| [88170] Microsoft IE Malformed Location Header 30x Redirect Handling DoS
2174| [88051] Microsoft Windows Crafted DHCPv6 Message Remote DoS
2175| [87819] Microsoft Office OneNote File Handling Memory Corruption
2176| [87273] Microsoft Office Excel XLS File Handling Overflow
2177| [87272] Microsoft Office Excel XLS File Invalid Length SST Handling Use-after-free Arbitrary Code Execution
2178| [87271] Microsoft Office Excel XLS File Handling Memory Corruption
2179| [87270] Microsoft Office Excel SerAuxErrBar XLS File Handling Overflow
2180| [87269] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2553)
2181| [87268] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2530)
2182| [87267] Microsoft .NET Framework WPF Reflection Optimization Object Permission Handling Arbitrary Code Execution
2183| [87266] Microsoft .NET Framework Web Proxy Setting Auto-Discovery (WPAD) Handling Remote Code Execution
2184| [87265] Microsoft .NET Framework Path Subversion Arbitrary DLL Injection Code Execution
2185| [87264] Microsoft .NET Framework Partially Trusted Code Function Handling Information Disclosure
2186| [87263] Microsoft .NET Framework Reflection Object Permission Handling Arbitrary Code Execution
2187| [87260] Microsoft Windows Briefcase Handling Underflow (2012-1527)
2188| [87259] Microsoft Windows Briefcase Handling Underflow (2012-1528)
2189| [87258] Microsoft IE CTreePos Deleted Object Handling Use-after-free Arbitrary Code Execution
2190| [87257] Microsoft IE CFormElement Deleted Object Handling Use-after-free Arbitrary Code Execution
2191| [87256] Microsoft IE CTreeNode Deleted Object Handling Use-after-free Arbitrary Code Execution
2192| [87255] Microsoft Office Excel XLS File Handling Memory Corruption
2193| [86929] Microsoft MN-700 Hardcoded SSL Private Key SSL Traffic Decryption Weakness
2194| [86913] Microsoft IE Recursive JavaScript Event Handling DoS
2195| [86906] Microsoft Multiple Products VBScript ActiveX Word Object Handling DoS
2196| [86905] Microsoft Windows NTFS ANSI API File Name Truncation Weakness
2197| [86903] Microsoft Windows NT CSRSS Malformed Console I/O Local DoS
2198| [86898] Microsoft IE Crafted IMG Tag Saturation Remote DoS
2199| [86896] Microsoft IE MSScriptControl.ScriptControl GetObject Arbitrary File Access
2200| [86866] Microsoft Windows Trusted Publisher Certificate Process Injection UAC Protection Bypass
2201| [86865] Microsoft Windows UAC Protection User-assisted Circumvention
2202| [86839] Microsoft Windows Media Player AVI File Handling Divide-by-Zero DoS
2203| [86790] Microsoft Virtual PC 2007 Crafted x86 Instruction Sequence Handling Local DoS
2204| [86776] Microsoft IE 9 File NULL Byte Handling XSS Filter Bypass
2205| [86768] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Handling Buffer Overflow
2206| [86767] Microsoft Office Publisher Read Access Violation PUB File Handling Memory Corruption
2207| [86733] Microsoft Office Picture Manager GIF Image File Handling Memory Corruption
2208| [86732] Microsoft Office DOC File Handling Stack Overflow
2209| [86623] Microsoft Office Excel / Excel Viewer (Xlview.exe) XLS File Handling Arbitrary Code Execution
2210| [86622] Microsoft SQL Server Local Authentication Bypass
2211| [86158] EMC NetWorker Module for Microsoft Applications (NMM) Communication Channel Crafted Message Parsing Remote Code Execution
2212| [86157] EMC NetWorker Module for Microsoft Applications (NMM) MS Exchange Server Upgrade / Installation Cleartext Admin Credential Local Information Disclosure
2213| [86061] Microsoft Windows Server 2008 R1 CSRSS ReadConsole / CloseHandle Local DoS
2214| [86060] Microsoft Windows Kerberos Implementation Session Handling Remote DoS
2215| [86059] Microsoft Multiple Product HTML String Sanitization XSS Weakness
2216| [86058] Microsoft Windows Kernel Unspecified Memory Object Handling Local Overflow
2217| [86057] Microsoft SQL Server Report Manager Unspecified XSS
2218| [86056] Microsoft Works Unspecified DOC File Handling Memory Corruption
2219| [86055] Microsoft Multiple Product RTF File listid Handling Use-after-free Remote Code Execution
2220| [86054] Microsoft Office Word File PAPX Section Handling Memory Corruption
2221| [85840] Microsoft Windows lpApplicationName Function Path Subversion Local Privilege Escalation
2222| [85833] Microsoft Outlook Concealed Attachment Weakness
2223| [85832] Microsoft Virtual Machine Custom Java Codebase Arbitrary Command Execution
2224| [85830] Microsoft IE index.dat OBJECT DATA Tag File Injection Arbitrary Command Execution
2225| [85826] Microsoft IE mstask.exe Malformed Packet Handling CPU Consumption Remote DoS
2226| [85749] Microsoft Windows win32k.sys TrueType Font File Handling Buffer Overflow
2227| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
2228| [85574] Microsoft IE cloneNode Element Use-after-free Memory Corruption
2229| [85573] Microsoft IE CTreeNode Object ISpanQualifier Instance Type Confusion Use-after-free Memory Corruption
2230| [85572] Microsoft IE Event Listener Unspecified Use-after-free Memory Corruption
2231| [85571] Microsoft IE OnMove Unspecified Use-after-free Memory Corruption
2232| [85532] Microsoft IE CMshtmlEd::Exec() Function Use-after-free Remote Code Execution
2233| [85444] Microsoft Windows NT MSIEXEC Registry Modification Local Privilege Escalation
2234| [85442] Microsoft Windows NT Predictable LPC Message Identifier Weakness
2235| [85418] Microsoft Windows Share Service File Handle Request Saturation Remote DoS
2236| [85316] Microsoft System Center Configuration Manager ReportChart.asp URI XSS
2237| [85315] Microsoft Visual Studio Team Foundation Server Unspecified XSS
2238| [85039] Microsoft Windows NT LPC Zone Exhaustion Local DoS
2239| [85038] Microsoft Windows Filename Extension Handling Overflow DoS
2240| [84912] Microsoft MS-CHAP V2 Virtual Private Network (VPN) MitM Password Disclosure
2241| [84886] McAfee Enterprise Mobility Manager (EMM) Portal About.aspx IIS Worker Process User Account Disclosure
2242| [84606] Microsoft Visio DXF File Handling Overflow
2243| [84605] Microsoft Office Computer Graphics Metafile (CGM) File Handling Memory Corruption
2244| [84604] Microsoft Windows JScript / VBScript Memory Object Size Calculation Website Handling Memory Corruption
2245| [84603] Microsoft Windows win32k.sys Use-after-free Local Privilege Escalation
2246| [84602] Microsoft Windows Remote Desktop Services Malformed RDP Packet Parsing Remote Code Execution
2247| [84601] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Stack Overflow
2248| [84600] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Heap Overflow
2249| [84599] Microsoft Windows Print Spooler Service Remote Format String
2250| [84598] Microsoft Windows netapi32.dll Remote Administration Protocol Malformed RAP Request Parsing Remote DoS
2251| [84597] Microsoft IE JavaScript Parsing Memory Object Size Calculation Memory Corruption
2252| [84596] Microsoft IE NULL Object Handling Use-after-free Arbitrary Code Execution
2253| [84595] Microsoft IE Layout Handling Deleted Object Handling Memory Corruption
2254| [84594] Microsoft IE Deleted Virtual Function Table Handling Arbitrary Code Execution
2255| [84593] Microsoft Multiple Product Windows Common Controls TabStrip ActiveX (MSCOMCTL.OCX) Document Handling Arbitrary Code Execution
2256| [84553] Microsoft Help &
2257| [83860] Microsoft IE XML Data Handling Arbitrary File Access
2258| [83797] Microsoft IE on NT Hashed Password Remote Disclosure MiTM Weakness
2259| [83796] Microsoft Windows DCOM RPCSS.exe Local Privilege Escalation
2260| [83751] Microsoft Windows Terminal Services LCA Issued Certificates Arbitrary Binary Signing Weakness
2261| [83750] Microsoft Windows Gadgets Unspecified Remote Code Execution
2262| [83720] Microsoft .NET Framework Crafted Tilde (~) Request Resource Consumption Remote DoS
2263| [83672] Microsoft IE NTLM Authentication Remote Information Disclosure
2264| [83660] Microsoft Windows TLS Protocol HTTPS Session Decryption Information Disclosure
2265| [83659] Microsoft Windows win32k.sys Keyboard Layout Handling Local Privilege Escalation
2266| [83658] Microsoft Windows win32k.sys Hook Procedure Creation Incorrect Type Handling Local Privilege Escalation
2267| [83657] Microsoft Windows ADO Cachesize Data Access Components Memory Object Handling Overflow
2268| [83656] Microsoft Windows File / Directory Name Handling Remote Code Execution
2269| [83655] Microsoft Visual Basic for Applications Unspecified Path Subversion Arbitrary DLL Injection Code Execution
2270| [83654] Microsoft Office for Mac Insecure Permissions Arbitrary File Creation Local Privilege Escalation
2271| [83653] Microsoft IE Deleted Cached Object Handling Memory Corruption
2272| [83652] Microsoft IE Attribute Removal Handling Memory Corruption
2273| [83651] Microsoft SharePoint Reflected List Parameter Unspecified XSS
2274| [83650] Microsoft SharePoint scriptresx.ashx Unspecified XSS
2275| [83649] Microsoft SharePoint Arbitrary User Search Scope Manipulation
2276| [83648] Microsoft SharePoint Unspecified Arbitrary Site Redirect
2277| [83647] Microsoft SharePoint Username Unspecified XSS
2278| [83567] Microsoft NT Advanced Server (NTAS) FTP Client Pipe Character Arbitrary Command Execution
2279| [83545] Microsoft Outlook Web App owa/redir.aspx URL Parameter Arbitrary Site Redirect
2280| [83453] Microsoft Windows ProfileList Registry Key Permission Weakness User Profile Subversion
2281| [83439] Microsoft IE Long Unicode String Handling DoS
2282| [83388] Microsoft JET Database Engine (MS Access) ODBC API Crafted VBA String Remote Command Execution
2283| [83169] Microsoft Windows NT telnetd Service Port Scan Remote DoS
2284| [83126] Microsoft Windows NT Registry Plaintext Service Password Local Disclosure
2285| [82928] Microsoft Windows atmfd.dll OpenType Font (OTF) File Handling DoS
2286| [82873] Microsoft XML Core Services Uninitalized Memory Object Handling Remote Code Execution
2287| [82872] Microsoft IE Scrolling Events Cross-domain Remote Information Disclosure
2288| [82871] Microsoft IE OnRowsInserted Deleted Object Handling Memory Corruption
2289| [82870] Microsoft IE insertRow Deleted Object Handling Memory Corruption
2290| [82869] Microsoft IE insertAdjacentText Memory Location Accessing Memory Corruption
2291| [82868] Microsoft IE OnBeforeDeactivate Event Deleted Object Handling Memory Corruption
2292| [82867] Microsoft IE Title Element Change Deleted Object Handling Memory Corruption
2293| [82866] Microsoft IE Col Element Deleted Object Handling Memory Corruption
2294| [82865] Microsoft IE Same ID Property Deleted Object Handling Memory Corruption
2295| [82864] Microsoft IE Developer Toolbar Deleted Object Handling Memory Corruption
2296| [82863] Microsoft IE Null Byte Process Memory Remote Information Disclosure
2297| [82862] Microsoft IE EUC-JP Character Encoding XSS
2298| [82861] Microsoft IE HTML Sanitization String Handling Remote Information Disclosure
2299| [82860] Microsoft IE Center Element Deleted Object Handling Memory Corruption
2300| [82859] Microsoft .NET Framework Memory Access Function Pointer Handling Memory Corruption
2301| [82858] Microsoft Windows win32k.sys Thread Creation Attempt Handling Race Condition Local Privilege Escalation
2302| [82857] Microsoft Windows TrueType Font Loading Font Resource Reference Counter Handling Local Overflow
2303| [82856] Microsoft Windows win32k.sys Clipboard Format Atom Name Handling Local Privilege Escalation
2304| [82855] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1865)
2305| [82854] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1864)
2306| [82853] Microsoft Dynamics AX Enterprise Portal Unspecified XSS
2307| [82852] Microsoft Lync Unspecified Path Subversion Arbitrary DLL Injection Code Execution
2308| [82851] Microsoft Windows Remote Desktop Protocol (RDP) Memory Object Handling Remote Code Execution
2309| [82850] Microsoft Windows User Mode Scheduler Memory Corruption Local Privilege Escalation
2310| [82849] Microsoft Windows BIOS Memory Handling ROM Corruption Local Privilege Escalation
2311| [82693] Microsoft Windows Terminal Server Licensing Service MD5 Hash Collision Code Signing Spoofing
2312| [82605] Microsoft Windows Explorer Crafted Subdirectory Parent Directory Deletion Local DoS
2313| [82604] Microsoft Windows Media Player Streamed Broadcast Handling Remote Overflow
2314| [82565] Microsoft IE / Outlook OBJECT Handling Arbitrary File Access
2315| [82564] Microsoft Word WebView Crafted Metadata Handling Arbitrary Script Execution
2316| [82563] Microsoft Visual Studio WebViewFolderIcon ActiveX (MSCOMM32.OCX) Overflow
2317| [82562] Microsoft IE Cross-Origin Window Forced Navigation Weakness
2318| [82505] Microsoft Windows IE Instances Overflow Group Policy Bypass
2319| [82491] Microsoft Windows UTF Character Set File Extension Spoofing Weakness
2320| [82473] Microsoft WordPad DOC File Handling NULL Pointer Dereference DoS
2321| [82405] Microsoft ASP.NET Session ID Generation Entropy Weakness
2322| [81903] Microsoft Office X for Macintosh Registration Service Remote Overflow DoS
2323| [81736] Microsoft Windows GDI+ EMF File Record Handling Remote Code Execution
2324| [81735] Microsoft Windows Partition Manager (partmgr.sys) PnP Configuration Manager Function Call Handling Local Privilege Escalation
2325| [81734] Microsoft .NET Framework Untrusted User Input Serialization Remote Code Execution
2326| [81733] Microsoft .NET Framework Partially Trusted Assembly Object Serialization Remote Code Execution
2327| [81732] Microsoft Office RTF Data Handling Memory Corruption
2328| [81731] Microsoft Visio Viewer Attribute Validation Visio File Handling Memory Corruption
2329| [81730] Microsoft Windows tcpip.sys Outbound Packet Filtering Windows Firewall Bypass
2330| [81729] Microsoft Windows tcpip.sys Double-free IPv6 Address Binding Parsing Local Privilege Escalation
2331| [81728] Microsoft Office Excel Excel File Handling Memory Corruption
2332| [81727] Microsoft Office Excel OBJECTLINK Record Excel File Handling Memory Corruption
2333| [81726] Microsoft Office Excel Modified Bytes Excel File Handling Memory Corruption
2334| [81725] Microsoft Office Excel SLXI Record Excel File Handling Memory Corruption
2335| [81724] Microsoft Office Excel Type Mismatch Series Record Excel File Handling Memory Corruption
2336| [81723] Microsoft Office Excel MergeCells Record Excel File Handling Overflow
2337| [81722] Microsoft .NET Framework Buffer Allocation XBAP / .NET Application Handling Remote Code Execution
2338| [81721] Microsoft .NET Framework WPF Application Index Value Comparison Request Parsing Remote DoS
2339| [81720] Microsoft Windows t2embed.dll Module TTF File Handling Remote Code Execution
2340| [81719] Microsoft Office GDI+ Library Embedded EMF Image Office Document Handling Overflow
2341| [81718] Microsoft Silverlight Hebrew Unicode Engine XAML Glyph Rendering Double-free Remote Code Execution
2342| [81717] Microsoft Windows win32k.sys Scrollbar Calculation Handling Local Privilege Escalation
2343| [81716] Microsoft Windows win32k.sys Keyboard Layout File Handling Local Privilege Escalation
2344| [81715] Microsoft Windows win32k.sys Windows and Messages Handling Local Privilege Escalation
2345| [81699] Microsoft Windows xxxCreateWindowEx() Function Invalid Memory Access Local DoS
2346| [81331] Microsoft Visual Studio Incremental Linker (link.exe) ConvertRgImgSymToRgImgSymEx Function COFF Symbol Table Executable Handling Remote Overflow
2347| [81135] Microsoft Windows Authenticode Signature Verification Functionality Signed Portable Executable File Digest Validation Remote Code Execution
2348| [81134] Microsoft Multiple Product Works Converter WPS File Handling Remote Overflow
2349| [81133] Microsoft .NET Framework CRL (Common Language Runtime) Function Parameter Parsing Remote Code Execution
2350| [81132] Microsoft Forefront Unified Access Gateway Default Website Configuration External Network Information Disclosure
2351| [81131] Microsoft Forefront Unified Access Gateway UAG Server Arbitrary Site Redirect
2352| [81130] Microsoft IE vgx.dll VML Style Deleted Object Handling Remote Memory Corruption
2353| [81129] Microsoft IE SelectAll Deleted Object Handling Remote Memory Corruption
2354| [81128] Microsoft IE onReadyStateChange Event Deleted Object Handling Remote Memory Corruption
2355| [81127] Microsoft IE JScript9 Deleted Object Handling Remote Memory Corruption
2356| [81126] Microsoft IE Print Feature HTML Page Printing Remote Code Execution
2357| [81125] Microsoft Multiple Product MSCOMCTL.OCX Multiple Control Memory Corruption
2358| [81112] Microsoft SQL Server RESTORE DATABASE Command SQL Injection
2359| [80487] Microsoft Security Essentials Antimalware Engine Malformed CAB File Handling Scan Bypass
2360| [80443] Microsoft Security Essentials Antimalware Engine Malformed RAR File Handling Scan Bypass
2361| [80402] Microsoft Security Essentials Antimalware Engine Malformed TAR File Handling Scan Bypass
2362| [80376] Sophos Anti-Virus Malformed Microsoft Office File Handling Scan Bypass
2363| [80375] Comodo Antivirus Malformed Microsoft Office File Handling Scan Bypass
2364| [80174] Microsoft IE Protected Mode Bypass Low Integrity Process Handling Memory Corruption DoS
2365| [80173] Microsoft IE Unspecified Overflow
2366| [80006] Microsoft Visual Studio Add-In Loading Local Privilege Escalation
2367| [80005] Microsoft Windows DNS Server Domain Resource Record Query Parsing Remote DoS
2368| [80004] Microsoft Windows Remote Desktop Protocol Terminal Server RDP Packet Parsing Remote DoS
2369| [80003] Microsoft Windows DirectWrite Unicode Character Parsing Remote DoS
2370| [80002] Microsoft Windows win32k.sys PostMessage() Function Local Privilege Escalation
2371| [80001] Microsoft Expression Design Path Subversion Arbitrary DLL Injection Code Execution
2372| [80000] Microsoft Windows Remote Desktop Protocol Array Element Loading Handling Double-free Remote Code Execution
2373| [79442] Microsoft Windows Server 2008 DNS Server Service Cache Update Policy Deleted Domain Name Resolving Weakness
2374| [79269] Microsoft Windows win32k.sys Use-after-free Keyboard Layout Memory Dereference Local Privilege Escalation
2375| [79268] Microsoft IE Deleted Object VML Handling Remote Memory Corruption
2376| [79267] Microsoft IE String Creation NULL Byte Handling Process Memory Information Disclosure
2377| [79266] Microsoft IE Deleted Object HTML Layout Handling Remote Memory Corruption
2378| [79265] Microsoft IE Copy and Paste Cross-domain Information Disclosure
2379| [79264] Microsoft SharePoint wizardlist.aspx skey Parameter XSS
2380| [79263] Microsoft SharePoint themeweb.aspx Unspecified XSS
2381| [79262] Microsoft SharePoint inplview.aspx Unspecified XSS
2382| [79261] Microsoft .NET Framework / Silverlight Buffer Length Calculation XAML Browser Application Handling Remote Memory Corruption
2383| [79260] Microsoft .NET Framework / Silverlight Unmanaged Object XAML Browser Application Handling Remote Code Execution
2384| [79259] Microsoft Windows C Run-Time Library msvcrt.dll Meta File Handling Remote Overflow
2385| [79258] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0038)
2386| [79257] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0037)
2387| [79256] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0036)
2388| [79255] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0020)
2389| [79254] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0019)
2390| [79253] Microsoft Windows Ancillary Function Driver (afd.sys) User Mode Input Parsing Local Privilege Escalation
2391| [79252] Microsoft Windows Ancillary Function Driver (afd.sys) AfdPoll User Mode Input Parsing Local Privilege Escalation
2392| [79192] Microsoft IE Javascript Dialog Origin Spoofing
2393| [79186] Microsoft IE onunload Location Field Overwrite
2394| [79173] Microsoft IE Image Control Title Attribute Status Bar Spoofing
2395| [79164] Microsoft IE about:blank Location Bar Overlay Phishing Weakness
2396| [79120] Microsoft Live Writer Path Subversion Arbitrary DLL Injection Code Execution
2397| [79118] Microsoft RDP Client Path Subversion Arbitrary DLL Injection Code Execution
2398| [79117] Microsoft Windows Program Group Path Subversion Arbitrary DLL Injection Code Execution
2399| [79116] Microsoft Snapshot Viewer Path Subversion Arbitrary DLL Injection Code Execution
2400| [79115] Microsoft MS Clip Book Viewer Path Subversion Arbitrary DLL Injection Code Execution
2401| [79114] Microsoft Clip Organizer Path Subversion Arbitrary DLL Injection Code Execution
2402| [79113] Microsoft Movie Maker Path Subversion Arbitrary DLL Injection Code Execution
2403| [79112] Microsoft Virtual PC Path Subversion Arbitrary DLL Injection Code Execution
2404| [78759] Microsoft Windows ICMPv6 Echo Request Remote Promiscuous Mode Detection
2405| [78738] Mozilla Multiple Products mImageBufferSize() Method image/vnd.microsoft.icon Image Encoding Information Disclosure
2406| [78212] Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote Code Execution
2407| [78211] Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Execution
2408| [78210] Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Code Execution
2409| [78209] Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading SafeSEH Security Bypass
2410| [78208] Microsoft AntiXSS Library Sanitization Module Escaped CSS Content Parsing XSS Weakness
2411| [78207] Microsoft Windows Embedded ClickOnce Application Office File Handling Remote Code Execution
2412| [78206] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unicode Character Parsing Local Privilege Escalation
2413| [78057] Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
2414| [78056] Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content Parsing Remote Code Execution
2415| [78055] Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
2416| [78054] Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary Site Redirect
2417| [78010] Microsoft Windows Phone Text Message Parsing Remote DoS
2418| [77908] Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote Memory Corruption
2419| [77675] Microsoft IE Content-Disposition Header Parsing Cross-Domain Remote Information Disclosure
2420| [77674] Microsoft IE Path Subversion Arbitrary DLL Injection Code Execution
2421| [77673] Microsoft IE XSS Filter Event Parsing Cross-Domain Remote Information Disclosure
2422| [77672] Microsoft Office Publisher Unspecified Publisher File Handling Remote Memory Corruption
2423| [77671] Microsoft Office Publisher Invalid Pointer Publisher File Handling Remote Memory Corruption
2424| [77670] Microsoft Office Publisher Array Indexing Publisher File Handling Remote Memory Corruption
2425| [77669] Microsoft Office Pinyin IME for Simplified Chinese Insecure Configuration Option Local Privilege Escalation
2426| [77668] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
2427| [77667] Microsoft Windows Active Directory Query Parsing Remote Overflow
2428| [77666] Microsoft Windows Kernel Exception Handler Local Privilege Escalation
2429| [77665] Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote Code Execution
2430| [77664] Microsoft Office PowerPoint OfficeArt Shape Record PowerPoint File Handling Remote Memory Corruption
2431| [77663] Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Remote Code Execution
2432| [77662] Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation
2433| [77661] Microsoft Office Excel Record Parsing Object Handling Remote Memory Corruption
2434| [77660] Microsoft Windows Media Player / Center DVR-MS File Handling Remote Memory Corruption
2435| [77659] Microsoft Office Use-after-free Border Property Word Document Handling Remote Code Execution
2436| [77620] Microsoft Windows IE Sandbox Restriction Bypass Local Privilege Escalation
2437| [77606] Microsoft IE JavaScript Implementation getComputedStyle Method Page Handling Remote Information Disclosure
2438| [77537] Microsoft IE Cache Objects IFRAME Handling Browsing History Disclosure
2439| [77262] Microsoft Windows win32k.sys Driver Keyboard Layout File Handling Local DoS
2440| [77228] Microsoft Outlook Client Large Header Handling Message Body Content Injection
2441| [77213] Microsoft Windows AppLocker Rule Weakness Local Access Restriction Bypass
2442| [76902] Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication Bypass
2443| [76901] Microsoft Windows Mail / Windows Meeting Space Path Subversion Arbitrary DLL Injection Code Execution
2444| [76900] Microsoft Windows Malformed TrueType Font Parsing DoS
2445| [76899] Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote Overflow
2446| [76843] Microsoft Windows Win32k TrueType Font Handling Privilege Escalation
2447| [76460] Microsoft Office Publisher pubconv.dll PUB File Handling Overflow
2448| [76236] Microsoft Forefront Unified Access Gateway MicrosoftClient.jar JAR File Code Execution
2449| [76235] Microsoft Forefront Unified Access Gateway ExcelTables Response Splitting Unspecified XSS
2450| [76234] Microsoft Forefront Unified Access Gateway Unspecified XSS
2451| [76233] Microsoft Forefront Unified Access Gateway ExcelTables Unspecified XSS
2452| [76232] Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation
2453| [76231] Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injection Code Execution
2454| [76224] Microsoft Host Integration Server Multiple Process Request Parsing Remote Memory Corruption DoS
2455| [76223] Microsoft Host Integration Server Multiple Process Request Parsing Infinite Loop Remote DoS
2456| [76221] Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arbitrary Code Execution
2457| [76220] Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow
2458| [76219] Microsoft Windows win32k.sys Driver Type Translation TrueType Font File Handling DoS
2459| [76218] Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Code Execution
2460| [76214] Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page Handling Remote Code Execution
2461| [76213] Microsoft IE Virtual Function Table Corruption mshtml.dll Extra Size Index Handling Remote Code Execution
2462| [76212] Microsoft IE Use-after-free swapNode() Method Body Element Handling Remote Code Execution
2463| [76211] Microsoft IE Select Element Handling Uninitialized Object Access Remote Memory Corruption
2464| [76210] Microsoft IE Jscript9.dll Uninitialized Object Access Remote Memory Corruption
2465| [76209] Microsoft IE Use-after-free OnLoad Event Handling Remote Code Execution
2466| [76208] Microsoft IE Use-after-free Type-Safety Weakness Option Element Handling Remote Code Execution
2467| [76207] Microsoft IE OLEAuto32.dll Uninitialized Object Access Remote Memory Corruption
2468| [76206] Microsoft IE Use-after-free Scroll Event Handling Remote Code Execution
2469| [76205] Microsoft Windows Media Center Path Subversion Arbitrary DLL Injection Code Execution
2470| [75511] Microsoft HTML Help itss.dll CHM File Handling Overflow
2471| [75473] Microsoft Windows Explorer shmedia.dll AVI File Handling Remote DoS
2472| [75444] Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Escalation
2473| [75394] Microsoft SharePoint Source Parameter Arbitrary Site Redirect
2474| [75393] Microsoft SharePoint Unspecified URI XSS
2475| [75391] Microsoft SharePoint Contact Details XSS
2476| [75390] Microsoft SharePoint EditForm.aspx XSS
2477| [75389] Microsoft SharePoint SharePoint Calendar URI XSS
2478| [75387] Microsoft Office Excel Unspecified Signedness Error Excel File Handling Memory Corruption
2479| [75386] Microsoft Office Excel Unspecified Conditional Expression Parsing Excel File Handling Memory Corruption
2480| [75385] Microsoft Office Excel Unspecified Excel File Record Handling Memory Corruption
2481| [75384] Microsoft Office Excel Unspecified Array-Indexing Weakness Excel File Handling Memory Corruption
2482| [75383] Microsoft Office Excel Unspecified Use-after-free Memory Dereference Excel File Handling Remote Code Execution
2483| [75382] Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Code Execution
2484| [75381] Microsoft SharePoint XML / XSL File Handling Unspecified Arbitrary File Disclosure
2485| [75380] Microsoft Office MSO.dll Object Pointer Dereference Word Document Handling Remote Code Execution
2486| [75379] Microsoft Office MSO.dll Path Subversion Arbitrary DLL Injection Code Execution
2487| [75271] Microsoft SilverLight DataGrid Memory Leak Multiple Element Remote DoS
2488| [75269] Microsoft Silverlight DependencyProperty Property Handling Remote DoS
2489| [75260] Microsoft Windows IPv6 Router Advertisement (RA) MitM Weakness
2490| [75250] Microsoft IE Unspecified Remote Code Execution
2491| [75199] Intel G41 Driver for Microsoft Windows Unspecified Page Handling DoS
2492| [75197] NVIDIA Geforce 310 Driver on Microsoft Windows Unspecified Page Handling DoS
2493| [75195] Microsoft Windows GPU Support Functionality Unspecified Page Handling DoS
2494| [75030] Microsoft msxml.dll xsltGenerateIdFunction Heap Memory Address Disclosure Weakness
2495| [74500] Microsoft IE STYLE Object Parsing Memory Corruption
2496| [74499] Microsoft IE SetViewSlave() Function XSLT Object Markup Reloading Memory Corruption
2497| [74498] Microsoft IE Shift JIS Character Sequence Parsing Cross-domain Remote Information Disclosure
2498| [74497] Microsoft IE Event Handler Cross-domain Remote Information Disclosure
2499| [74496] Microsoft IE Protected Mode Bypass Arbitrary File Creation
2500| [74495] Microsoft IE window.open() Function Race Condition Memory Corruption
2501| [74494] Microsoft IE Crafted Link Telnet URI Handler Remote Program Execution
2502| [74483] Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS
2503| [74482] Microsoft Windows TCP/IP Stack (Tcpip.sys) ICMP Message Parsing Remote DoS
2504| [74450] Microsoft IE HTTPS Session HTTP Set-Cookie Header HSTS includeSubDomains Weakness MiTM Arbitrary Cookie Overwrite
2505| [74408] Microsoft Windows Data Access Tracing Component Path Subversion Arbitrary DLL Injection Code Execution
2506| [74407] Microsoft Windows Kernel File Metadata Handling Remote DoS
2507| [74406] Microsoft Windows Remote Desktop Web Access Logon Page Unspecified XSS
2508| [74405] Microsoft Windows Remote Desktop Protocol RDP Packet Parsing Remote DoS
2509| [74404] Microsoft .NET Framework System.Net.Sockets Code Access Security Bypass Information Disclosure
2510| [74403] Microsoft .NET Framework Chart Control Special URI Character GET Request Parsing Remote Information Disclosure
2511| [74402] Microsoft Windows Remote Access Service NDISTAPI Driver User Input Validation Weakness Local Privilege Escalation
2512| [74401] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Inter-Process Device Event Message Parsing Local Privilege Escalation
2513| [74400] Microsoft Windows DNS Service Non-Existent Domain Query Parsing Remote DoS
2514| [74399] Microsoft Windows DNS Service NAPTR Query Parsing Overflow
2515| [74398] Microsoft Visio Move Around the Block Visio File Handling Remote Code Execution
2516| [74397] Microsoft Visio pStream Release Visio File Handling Remote Code Execution
2517| [74396] Microsoft Report Viewer Control Unspecified XSS
2518| [74265] Microsoft Windows CSRSS winsrv.dll SrvGetConsoleTitle() Function Type Casting Weakness Local DoS
2519| [74052] Microsoft IE EUC-JP Encoding Unspecified XSS
2520| [73880] ArcSight Connector Appliance Windows Event Log SmartConnector Microsoft OS Version Field XSS
2521| [73799] Microsoft Windows Bluetooth Driver Object Handling Remote Code Execution
2522| [73796] Microsoft Windows CSRSS SrvSetConsoleLocalEUDC() Function NULL Page Data Write Local Privilege Escalation
2523| [73795] Microsoft Windows CSRSS SrvWriteConsoleOutputString() Function Local Overflow
2524| [73794] Microsoft Windows CSRSS SrvWriteConsoleOutput() Function Local Overflow
2525| [73793] Microsoft Windows CSRSS SrvSetConsoleNumberOfCommand() Function Kernel Memory Access Local Privilege Escalation
2526| [73792] Microsoft Windows CSRSS AllocConsole() Function Multiple Console Object Orphaning Local Privilege Escalation
2527| [73791] Microsoft Windows win32k.sys Driver Function Argument Validation Unspecified Local Information Disclosure
2528| [73790] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1888)
2529| [73789] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1887)
2530| [73788] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1885)
2531| [73787] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1881)
2532| [73786] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1880)
2533| [73785] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1875)
2534| [73784] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1884)
2535| [73783] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1883)
2536| [73782] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1882)
2537| [73781] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1879)
2538| [73780] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1878)
2539| [73779] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1877)
2540| [73778] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1876)
2541| [73777] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1874)
2542| [73670] Microsoft IE XSLT Heap Memory Address Information Disclosure
2543| [73660] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
2544| [73654] Microsoft Windows fxsst.dll Path Subversion DLL Injection Code Execution
2545| [73602] Microsoft Windows nsiproxy.sys Local DoS
2546| [73380] Microsoft Lync Web Components Server Reach/Client/WebPages/ReachJoin.aspx reachLocale Parameter XSS
2547| [73372] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
2548| [73100] Microsoft Word Insufficient Pointer Validation Memory Corruption
2549| [72960] Microsoft SMB Client Response Handling Remote Code Execution
2550| [72959] Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution
2551| [72955] Microsoft Windows Ancillary Function Driver Local Privilege Escalation
2552| [72954] Microsoft IE Vector Markup Language (VML) Object Handling Memory Corruption
2553| [72953] Microsoft IE MIME Sniffing Information Disclosure
2554| [72952] Microsoft IE CDL Protocol 302 HTTP Redirect Memory Corruption
2555| [72951] Microsoft IE selection.empty JavaScript Statement onclick Event Memory Corruption
2556| [72950] Microsoft IE layout-grid-char Style Property Handling Memory Corruption
2557| [72949] Microsoft IE Drag and Drop Information Disclosure
2558| [72948] Microsoft IE Multiple JavaScript Modifications DOM Manipulation Memory Corruption
2559| [72947] Microsoft IE Time Element Memory Corruption
2560| [72946] Microsoft IE Drag and Drop Memory Corruption
2561| [72944] Microsoft IE SafeHTML Function XSS
2562| [72943] Microsoft IE vgx.dll imagedata VML Object DOM Modification Memory Corruption
2563| [72942] Microsoft IE Link Properties Handling Memory Corruption
2564| [72937] Microsoft Windows Active Directory Certificate Services Web Enrollment XSS
2565| [72936] Microsoft Windows Server Service Crafted SMB Request Parsing Remote DoS
2566| [72935] Microsoft Windows MHTML Mime-Formatted Request Unspecified XSS
2567| [72934] Microsoft XML Editor External Entities Resolution Unspecified Information Disclosure
2568| [72933] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Winsock Provider Remote Code Execution
2569| [72932] Microsoft .NET Framework JIT Object Validation Arbitrary Code Execution
2570| [72931] Microsoft .NET Framework / Silverlight Array Offset Remote Code Execution
2571| [72930] Microsoft Windows Hyper-V VMBus vmswitch.sys Crafted Packet Cross-guest Local DoS
2572| [72929] Microsoft Windows Distributed File System (DFS) Referral Response Handling Remote DoS
2573| [72928] Microsoft Windows Distributed File System (DFS) Response Handling Memory Corruption Remote Code Execution
2574| [72927] Microsoft Office Excel Out of Bounds WriteAV Unspecified Arbitrary Code Execution
2575| [72926] Microsoft Office Excel WriteAV Unspecified Arbitrary Code Execution
2576| [72925] Microsoft Office Excel File Handling Unspecified Memory Corruption
2577| [72924] Microsoft Office Excel File Handling Unspecified Buffer Overflow
2578| [72923] Microsoft Office Excel Unspecified Memory Heap Overwrite Arbitrary Code Execution
2579| [72922] Microsoft Office Excel Out of Bounds Array Access Unspecified Arbitrary Code Execution
2580| [72921] Microsoft Office Excel Improper Record Parsing Unspecified Arbitrary Code Execution
2581| [72920] Microsoft Office Excel Insufficient Record Validation Unspecified Arbitrary Code Execution
2582| [72919] Microsoft Windows OpenType Font (OTF) Pointer Validation Arbitrary Code Execution
2583| [72724] Microsoft IE Cookie Jacking Account Authentication Bypass
2584| [72696] Microsoft Reader AOLL Chunk Array Overflow
2585| [72695] Microsoft Reader ITLS Header Piece Handling Overflow
2586| [72688] Microsoft IE CEnroll tar.setPendingRequestInfo Remote DoS
2587| [72687] Microsoft Reader aud_file.dll Audible Audio File Handling Null Byte Memory Corruption
2588| [72686] Microsoft Reader msreader.exe Integer Underflow LIT File Handling Overflow
2589| [72685] Microsoft Reader msreader.exe LIT File Handling Overflow
2590| [72680] Microsoft IE UTF-7 Local Redirection XSS
2591| [72679] Microsoft IE Tags javascript:[jscodz] XSS
2592| [72677] Microsoft IE Mime-Sniffing Content-Type Handling Weakness
2593| [72676] Microsoft Windows Kernel-mode GS Cookie Entropy Weakness
2594| [72674] Microsoft IE img Tag Cross-domain Cookie Disclosure
2595| [72672] Microsoft Windows AppFix systest.sdb Local DoS
2596| [72671] Microsoft Excel Spreadsheet Printing Memory Cleartext PIN Disclosure
2597| [72670] Microsoft Windows Server 2003 ActiveDirectory BROWSER ELECTION Remote Overflow
2598| [72236] Microsoft Office PowerPoint Presentation Parsing Unspecified Overflow
2599| [72235] Microsoft Office PowerPoint File Handling Unspecified Memory Corruption
2600| [72234] Microsoft Windows WINS Service Failed Response Data Reuse Memory Corruption Remote Code Execution
2601| [71788] Microsoft Windows Messenger ActiveX Unspecified Remote Code Execution
2602| [71782] Microsoft .NET Framework x86 JIT Compiler XAML Browser Application (XBAP) Processing Stack Corruption
2603| [71781] Microsoft Windows SMB Transaction Parsing Unspecified Remote Code Execution
2604| [71780] Microsoft Windows DNS Client Service LLMNR Query Processing Remote Code Execution
2605| [71779] Microsoft Windows/Office GDI+ (gdiplus.dll) EMF File Processing Overflow
2606| [71778] Microsoft Windows Wordpad Word 97 Converter sprmTTextFlow / sprmTSplit PRLs Parsing Memory Corruption
2607| [71777] Microsoft IE Frame Tag Handling Information Disclosure
2608| [71776] Microsoft Windows OpenType Font (OTF) Driver Font Processing Overflow
2609| [71775] Microsoft Windows Fax Cover Page Editor fxscover.exe Text Element Handling Memory Corruption
2610| [71774] Microsoft Windows JScript / VBScript Engine Scripting Memory Reallocation Overflow
2611| [71773] Microsoft Windows Common Internet File System (CIFS) Malformed Browser Message Handling Overflow
2612| [71772] Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution
2613| [71771] Microsoft Office PowerPoint TimeColorBehaviorContainer (Techno-color Time Bandit) Floating Point Processing Remote Code Execution
2614| [71770] Microsoft Office PowerPoint PersistDirectoryEntry Processing Remote Code Execution
2615| [71769] Microsoft Office PowerPoint OfficeArt Atom Parsing Remote Code Execution
2616| [71767] Microsoft Office Path Subversion Arbitrary DLL Injection Code Execution
2617| [71766] Microsoft Office Excel RealTimeData Record Parsing WriteAV Remote Code Execution
2618| [71765] Microsoft Office Excel File Validation Record Handling Overflow
2619| [71761] Microsoft Office Excel File Handling Memory Corruption
2620| [71760] Microsoft Office Excel File Handling Unspecified Memory Corruption
2621| [71759] Microsoft Office Excel External Record Parsing Signedness Overflow
2622| [71758] Microsoft Office Excel Substream Parsing Integer Underflow
2623| [71757] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1242)
2624| [71756] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1241)
2625| [71755] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1240)
2626| [71754] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1239)
2627| [71753] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1238)
2628| [71752] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1237)
2629| [71751] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1236)
2630| [71750] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1235)
2631| [71749] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1234)
2632| [71748] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0675)
2633| [71747] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0674)
2634| [71746] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0672)
2635| [71745] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0671)
2636| [71744] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0670)
2637| [71743] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0667)
2638| [71742] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0666)
2639| [71741] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0665)
2640| [71740] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0662)
2641| [71739] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1233)
2642| [71738] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1232)
2643| [71737] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1231)
2644| [71736] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1230)
2645| [71735] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1229)
2646| [71734] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1228)
2647| [71732] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1227)
2648| [71731] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1226)
2649| [71730] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1225)
2650| [71729] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0677)
2651| [71728] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0676)
2652| [71727] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0673)
2653| [71726] Microsoft IE JavaScript Unspecified Cross-domain Information Disclosure
2654| [71725] Microsoft IE Object Management onPropertyManagement Processing Memory Corruption
2655| [71724] Microsoft IE Layouts Handling Memory Corruption
2656| [71670] Microsoft IE Pop-up Window Address Bar Spoofing Weakness
2657| [71668] Microsoft Visual Studio CPFE.DLL Malformed Source File Handling DoS
2658| [71667] Microsoft Windows SetDllDirectory Function Binary Planting Protection Bypass
2659| [71665] Microsoft .NET Framework on XP KB982671 Persistent Firewall Disablement
2660| [71594] Microsoft IE JavaScript Math.random Implementation Seed Reconstruction Weakness
2661| [71086] Microsoft Visual Studio MFC Applications Path Subversion Arbitrary DLL Injection Code Execution
2662| [71017] Microsoft Malware Protection Engine (MMPE) Crafted Registry Key Local Privilege Escalation
2663| [71016] Microsoft Windows Media Player / Center .dvr-ms File Handling Arbitrary Code Execution
2664| [71015] Microsoft Windows DirectShow Path Subversion Arbitrary DLL Injection Code Execution
2665| [71014] Microsoft Windows Remote Desktop Client Path Subversion Arbitrary DLL Injection Code Execution
2666| [70904] Microsoft Office Excel OfficeArt Container Parsing Memory Corruption
2667| [70885] Microsoft Windows LSASS Authentication Request Privilege Escalation
2668| [70881] Microsoft Windows SMB Browser Election Request Server Name String Overflow
2669| [70835] Microsoft Windows Kerberos Authentication Downgrade Weakness
2670| [70834] Microsoft Windows Kerberos Unkeyed Checksum Hashing Mechanism Service Ticket Forgery
2671| [70833] Microsoft IE Insecure Library Loading Remote Code Execution
2672| [70832] Microsoft IE mshtml.dll Dangling Pointer Memory Corruption Remote Code Execution
2673| [70831] Microsoft IE Uninitialized Memory Corruption Remote Code Execution (2011-0035)
2674| [70829] Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code Execution
2675| [70828] Microsoft Visio LZW Stream Decompression Exception Remote Code Execution
2676| [70827] Microsoft Windows JScript / VBScript Scripting Engine Memory Corruption Information Disclosure
2677| [70826] Microsoft Windows CSRSS Logoff Process Termination Local Information Disclosure
2678| [70825] Microsoft Windows Server Active Directory Server Principal Name (SPN) Handling Remote DoS
2679| [70823] Microsoft Windows Kernel Trace Event (WmiTraceMessageVa) Handling Integer Truncation Local Privilege Escalation
2680| [70821] Microsoft OpenType Compact Font Format (CFF) Parsing Remote Code Execution
2681| [70819] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0087)
2682| [70818] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0086)
2683| [70817] Microsoft Windows Kernel Class Improper Pointer Validation Unspecified Local Privilege Escalation
2684| [70816] Microsoft Windows Kernel Window Class Pointer Confusion Unspecified Local Privilege Escalation
2685| [70814] Microsoft Windows Kernel Unspecified Memory Corruption Local Privilege Escalation
2686| [70813] Microsoft Office PowerPoint OfficeArt Container Parsing Remote Code Execution
2687| [70812] Microsoft Office Excel Invalid Object Type Handling Remote Code Execution
2688| [70811] Microsoft Office Excel Axis Properties Record Parsing Overflow
2689| [70810] Microsoft Office Excel Drawing File Format Shape Data Parsing Use-after-free Arbitrary Code Execution
2690| [70693] Microsoft Windows MHTML Protocol Handler MIME Formatted Request XSS
2691| [70689] Microsoft Windows USB Human Interface Device Functionality Warning Weakness Arbitrary Program Execution
2692| [70444] Microsoft Data Access Components (MDAC / WDAC) MSADO Record CacheSize Handling Remote Code Execution
2693| [70443] Microsoft Data Access Components (MDAC / WDAC) ODBC API (odbc32.dll) SQLConnectW Function DSN / szDSN Argument Handling Overflow
2694| [70392] Microsoft IE DOM Implementation cross_fuzz GUI Display Weakness
2695| [70391] Microsoft IE MSHTML.DLL ReleaseInterface Function Use-after-free Arbitrary Code Execution
2696| [70390] Microsoft Windows IPv6 Stack Neighbor Discovery Router Advertisement Message Saturation Remote DoS
2697| [70263] Microsoft Windows Bitmap Thumbnail shimgvw.dll CreateSizedDIBSECTION() Function biClrUsed Parameter Overflow
2698| [70126] Microsoft Windows Fax Cover Page Editor CDrawPoly::Serialize() Function Overflow
2699| [70000] Microsoft Windows Remote Access Phonebook (rasphone.exe) Path Subversion Arbitrary EXE Injection Code Execution
2700| [69942] Microsoft WMI Administrative Tools WEBSingleView.ocx ActiveX Remote Code Execution
2701| [69830] Microsoft IE Cross-Domain Information Disclosure (2010-3348)
2702| [69829] Microsoft IE HTML+Time Element outerText Memory Corruption
2703| [69828] Microsoft IE Recursive Select Element Remote Code Execution
2704| [69827] Microsoft IE Animation HTML Object Memory Corruption (2010-3343)
2705| [69826] Microsoft IE Cross-Domain Information Disclosure (2010-3342)
2706| [69825] Microsoft IE HTML Object Memory Corruption (2010-3340)
2707| [69824] Microsoft Windows Consent User Interface Local Privilege Escalation
2708| [69823] Microsoft Windows Routing and Remote Access NDProxy Unspecified Local Code Execution
2709| [69822] Microsoft Windows OpenType Font Driver CMAP Table Parsing Arbitrary Code Execution
2710| [69821] Microsoft Windows OpenType Font Driver Pointer Handling Double-free Arbitrary Code Execution
2711| [69820] Microsoft Windows OpenType Font Driver Index Array Unspecified Code Execution
2712| [69819] Microsoft Windows Netlogon RPC Service Crafted Request Remote DoS
2713| [69818] Microsoft Windows Hyper-V VMBus Crafted Packet Local DoS
2714| [69817] Microsoft SharePoint Office Document Load Balancer Crafted SOAP Request Remote Code Execution
2715| [69816] Microsoft Windows BranchCache Path Subversion Arbitrary DLL Injection Code Execution
2716| [69815] Microsoft Office Publisher Array Indexing Memory Corruption
2717| [69814] Microsoft Office Publisher Malformed PUB File Handling Memory Corruption
2718| [69813] Microsoft Office Publisher pubconv.dll Array Indexing Memory Corruption
2719| [69812] Microsoft Office Publisher pubconv.dll Unspecified Heap Overrun
2720| [69811] Microsoft Office Publisher pubconv.dll Size Value Handling Heap Corruption
2721| [69810] Microsoft Exchange Server store.exe Malformed MAPI Request Infinite Loop Remote DoS
2722| [69809] Microsoft Office FlashPix Image Converter Tile Data Handling Heap Corruption
2723| [69808] Microsoft Office FlashPix Image Converter Picture Set Processing Overflow
2724| [69807] Microsoft Office Document Imaging Endian Conversion TIFF Image Handling Memory Corruption
2725| [69806] Microsoft Office TIFF Image Converter Endian Conversion Buffer Overflow
2726| [69805] Microsoft Office TIFF Import/Export Graphic Filter Converter Multiple Overflows
2727| [69804] Microsoft Office PICT Image Converter Overflow
2728| [69803] Microsoft Office CGM Image Converter Overflow
2729| [69802] Microsoft Windows win32k.sys Cursor Linking Unspecified Local Privilege Escalation
2730| [69801] Microsoft Windows win32k.sys WriteAV Unspecified Local Privilege Escalation
2731| [69800] Microsoft Windows win32k.sys Unspecified Double-free Local Privilege Escalation
2732| [69799] Microsoft Windows win32k.sys PFE Pointer Double-free Local Privilege Escalation
2733| [69798] Microsoft Windows win32k.sys Unspecified Memory Corruption Local Privilege Escalation
2734| [69797] Microsoft Windows win32k.sys Unspecified Local Overflow
2735| [69796] Microsoft IE CSS Parser mshtml.dll CSharedStyleSheet::Notify Function Use-after-free Remote Code Execution
2736| [69501] Microsoft Windows win32k.sys Driver GreEnableEUDC() Function Local Overflow
2737| [69465] Microsoft Windows win32k.sys NtGdiEnableEUDC Local Overflow Privilege Escalation
2738| [69311] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
2739| [69095] Microsoft Forefront Unified Access Gateway (UAG) Signurl.asp XSS
2740| [69094] Microsoft Forefront Unified Access Gateway (UAG) Mobile Portal Website Unspecified XSS
2741| [69093] Microsoft Forefront Unified Access Gateway (UAG) EOP Unspecified XSS
2742| [69092] Microsoft Forefront Unified Access Gateway (UAG) Redirection Spoofing Weakness
2743| [69091] Microsoft Office PowerPoint File Animation Node Parsing Underflow Heap Corruption
2744| [69090] Microsoft Office PowerPoint 95 File Parsing Overflow
2745| [69089] Microsoft Office Insecure Library Loading Remote Code Execution
2746| [69088] Microsoft Office MSO Large SPID Read AV Remote Code Execution
2747| [69087] Microsoft Office Drawing Exception Handling Remote Code Execution
2748| [69086] Microsoft Office Art Drawing Record Parsing Remote Code Execution
2749| [69085] Microsoft Office 2010 RTF File Handling pFragments Buffer Overflow Arbitrary Code Execution
2750| [68987] Microsoft IE mshtml CSS Tag Use-after-free Memory Corruption
2751| [68946] Microsoft Windows DAO Object Library Path Subversion Arbitrary DLL Injection Code Execution
2752| [68933] Microsoft Windows Shell32.dll Environment Variable Expansion SetDllDirectory Function Bypass
2753| [68857] Microsoft Windows XP wscript.exe Path Subversion Arbitrary DLL Injection Code Execution
2754| [68855] Microsoft IE window.onerror Error Handling URL Destination Information Disclosure
2755| [68586] Microsoft Windows LRPC Server LPC Message Handling Local Privilege Escalation
2756| [68585] Microsoft Foundation Classes (MFC) Library Window Title Handling Remote Overflow
2757| [68584] Microsoft Office Word Uninitialized Pointer Handling Remote Code Execution
2758| [68583] Microsoft Office Word Unspecified Boundary Check Remote Code Execution
2759| [68582] Microsoft Office Word Array Index Value Handling Unspecified Remote Code Execution
2760| [68581] Microsoft Office Word File Unspecified Structure Handling Stack Overflow
2761| [68580] Microsoft Office Word Return Value Handling Unspecified Remote Code Execution
2762| [68579] Microsoft Office Word Bookmark Handling Invalid Pointer Remote Code Execution
2763| [68578] Microsoft Office Word Pointer LFO Parsing Double-free Remote Code Execution
2764| [68577] Microsoft Office Word Malformed Record Handling Remote Heap Overflow
2765| [68576] Microsoft Office Word BKF Object Parsing Array Indexing Remote Code Execution
2766| [68575] Microsoft Office Word File LVL Structure Parsing Remote Code Execution
2767| [68574] Microsoft Office Word File Record Parsing Unspecified Memory Corruption
2768| [68573] Microsoft Office Excel File Unspecified Record Parsing Remote Integer Overflow
2769| [68572] Microsoft Office Excel Formula Record Parsing Memory Corruption (2010-3231)
2770| [68571] Microsoft Office Excel File Format Parsing Remote Code Execution
2771| [68569] Microsoft Office Excel Formula Substream Record Parsing Memory Corruption
2772| [68568] Microsoft Office Excel Formula Biff Record Parsing Remote Code Execution
2773| [68567] Microsoft Office Excel Out Of Bounds Array Handling Remote Code Execution
2774| [68566] Microsoft Office Excel Merge Cell Record Pointer Handling Remote Code Execution
2775| [68565] Microsoft Office Excel Negative Future Function Parsing Remote Code Execution
2776| [68564] Microsoft Office Excel PtgExtraArray Structure Parsing Remote Code Execution
2777| [68563] Microsoft Office Excel RealTimeData Record Array Parsing Remote Code Execution
2778| [68562] Microsoft Office Excel Out-of-Bounds Memory Write in Parsing Memory Corruption
2779| [68561] Microsoft Office Excel Ghost Record Type Parsing Remote Code Execution
2780| [68560] Microsoft Windows SChannel TLSv1 Crafted Client Certificate Request DoS
2781| [68559] Microsoft Windows OpenType Font Parsing Unspecified Remote Code Execution
2782| [68558] Microsoft Windows OpenType Malformed Font Validation Remote Code Execution
2783| [68557] Microsoft Windows Media Player Reload Operation Object Deallocation Memory Corruption
2784| [68556] Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Code Execution
2785| [68554] Microsoft Windows Server 2008 Shared Cluster Disks Addition Default Permission Weakness
2786| [68553] Microsoft Windows t2embed.dll Embedded OpenType Font Parsing hdmx Record Parsing Overflow
2787| [68552] Microsoft Windows win32k.sys Driver Keyboard Layout Loading Local Privilege Escalation
2788| [68551] Microsoft Windows win32k.sys Driver Window Class Data Validation Local Privilege Escalation
2789| [68550] Microsoft Windows Media Player Network Sharing Service RTSP Use-after-free Remote Code Execution
2790| [68549] Microsoft Windows Common Control Library (comctl32.dll) Third-party SVG Content Handling Overflow
2791| [68548] Microsoft IE / SharePoint Unspecified XSS
2792| [68547] Microsoft IE CSS Special Character Processing Unspecified Information Disclosure
2793| [68546] Microsoft IE Object Handling Unspecified Memory Corruption (2010-3326)
2794| [68545] Microsoft IE Anchor Element Handling Unspecified Information Disclosure
2795| [68544] Microsoft IE AutoComplete Functionality Unspecified Information Disclosure
2796| [68543] Microsoft IE HtmlDlgHelper Class Object Handling Memory Corruption
2797| [68542] Microsoft IE CSS imports() Cross-domain Information Disclosure
2798| [68541] Microsoft IE mshtml.dll CAttrArray::PrivateFind Function Object Handling Memory Corruption
2799| [68540] Microsoft IE mshtml.dll Object Handling Uninitialized Memory Corruption (2010-3331)
2800| [68532] Microsoft Windows rpcrt4.dll LRPC_SCALL::SendRequest() Function LPC Message Local Overflow DoS
2801| [68518] Microsoft Windows on 32-bit Task Scheduler Crafted Application Local Privilege Escalation
2802| [68517] Microsoft Windows on 32-bit win32k.sys Keyboard Layout Loading Local Privilege Escalation
2803| [68438] Microsoft XSS Filter Library Bypass
2804| [68151] Microsoft Office Word MSO.dll Crafted Document Buffer NULL Dereference DoS
2805| [68127] Microsoft ASP.NET ViewState Cryptographic Padding Remote Information Disclosure
2806| [68123] Microsoft IE / SharePoint toStaticHTML Function Crafted CSS @import Rule XSS Protection Mechanism Bypass
2807| [67988] Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Procedure Remote Code Execution
2808| [67987] Microsoft Windows LSASS Implementation Malformed LDAP Message Handling Remote Overflow
2809| [67986] Microsoft Windows Client/Server Runtime Subsystem (CSRSS) Local Privilege Escalation
2810| [67985] Microsoft Windows MPEG-4 Codec Content Parsing Overflow
2811| [67984] Microsoft Multiple Products Unicode Scripts Processor (Usp10.dll) OpenType Font Processing Memory Corruption
2812| [67983] Microsoft Windows WordPad Text Converters Document Parsing Memory Corruption
2813| [67982] Microsoft Outlook E-mail Content Parsing Remote Overflow
2814| [67981] Microsoft Windows RPC Response Processing Remote Memory Corruption
2815| [67977] Microsoft Visual C++ Redistributable Path Subversion Arbitrary DLL Injection Code Execution
2816| [67834] Microsoft IE Cross-Origin CSS Style Sheet Handling Information Disclosure
2817| [67784] Microsoft Windows Media Encoder Path Subversion Arbitrary DLL Injection Code Execution
2818| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
2819| [67722] Microsoft Windows Internet Connection Signup Wizard Path Subversion Arbitrary DLL Injection Code Execution
2820| [67600] Microsoft Windows Media Player Path Subversion Arbitrary DLL Injection Code Execution
2821| [67599] Microsoft Windows Live Messenger Path Subversion Arbitrary DLL Injection Code Execution
2822| [67598] Microsoft Office OneNote Path Subversion Arbitrary DLL Injection Code Execution
2823| [67597] Microsoft Office Word Path Subversion Arbitrary DLL Injection Code Execution
2824| [67596] Microsoft Office Excel Path Subversion Arbitrary DLL Injection Code Execution
2825| [67595] Microsoft Office Access Path Subversion Arbitrary DLL Injection Code Execution
2826| [67594] Microsoft Outlook Path Subversion Arbitrary DLL Injection Code Execution
2827| [67553] Microsoft Windows Contacts Path Subversion Arbitrary DLL Injection Code Execution
2828| [67552] Microsoft Windows Internet Communication Settings Path Subversion Arbitrary DLL Injection Code Execution
2829| [67551] Microsoft Windows Indeo Codec (ac25_32.ax) Path Subversion Arbitrary DLL Injection Code Execution
2830| [67548] Microsoft Windows Vista BitLocker Drive Encryption Path Subversion Arbitrary DLL Injection Code Execution
2831| [67546] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
2832| [67543] Microsoft Windows Movie Maker Path Subversion Arbitrary OCX Injection Code Execution
2833| [67535] Microsoft Windows Progman Group Converter Path Subversion Arbitrary DLL Injection Code Execution
2834| [67503] Microsoft Outlook Express Path Subversion Arbitrary DLL Injection Code Execution
2835| [67500] Microsoft Windows Live Mail Path Subversion Arbitrary DLL Injection Code Execution
2836| [67484] Microsoft Office Groove Path Subversion Arbitrary DLL Injection Code Execution
2837| [67483] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
2838| [67463] Microsoft IE location.replace Address Bar Spoofing
2839| [67408] Microsoft Windows Ipv4SetEchoRequestCreate() Interruption DoS
2840| [67365] Microsoft IE removeAttribute() Method Multiple HTML Element Handling NULL Pointer DoS
2841| [67258] Microsoft ClickOnce MITM Weakness
2842| [67132] Microsoft IE Modal Application Prompt Rendering Unspecified DoS
2843| [67131] Microsoft IE mshtml.dll Malformed CSS Handling DoS
2844| [67119] Microsoft Outlook Web Access (OWA) Multiple Function CSRF
2845| [67083] Microsoft Windows TAPI Server (TAPISRV) Service Isolation Bypass Local Privilege Escalation
2846| [67005] Microsoft Windows TCP/IP Implementation IppSortDestinationAddresses() Function Local Overflow
2847| [67004] Microsoft Windows Malformed IPv6 Extension Header Handling Remote Memory Corruption DoS
2848| [67003] Microsoft IE HTML Layout Table Element Handling Memory Corruption
2849| [67002] Microsoft IE Object Handling Unspecified Memory Corruption (2010-2559)
2850| [67001] Microsoft IE CIframeElement Object Handling Race Condition Memory Corruption
2851| [67000] Microsoft IE boundElements Property Handling Memory Corruption
2852| [66999] Microsoft IE OnPropertyChange_Src() Function Malformed HTML/JS Data Handling Memory Corruption
2853| [66998] Microsoft IE Event Handler Unspecified Cross-domain Information Disclosure
2854| [66997] Microsoft Office Word DOC plcffldMom Parsing Memory Corruption
2855| [66996] Microsoft Office Word RTF Document Object Control Word Drawing Overflow
2856| [66995] Microsoft Office Word RTF Document Control Word Parsing Memory Corruption
2857| [66994] Microsoft Office Word Malformed Record Parsing Unspecified Remote Code Execution
2858| [66993] Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote Code Execution
2859| [66992] Microsoft Silverlight Pointer Handling Unspecified Memory Corruption
2860| [66991] Microsoft Office Excel PivotTable Cache Data Record Handling Overflow
2861| [66990] Microsoft Windows Kernel Object ACL Validation SeObjectCreateSaclAccessBits() Local DoS
2862| [66989] Microsoft Windows Kernel Object Initialization Error Handling Local Privilege Escalation
2863| [66988] Microsoft Windows Kernel Thread Creation Handling NtCreateThread() Local Privilege Escalation
2864| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
2865| [66986] Microsoft Windows Movie Maker Imported Projector File (.MSWMM) String Parsing Overflow
2866| [66985] Microsoft Windows MPEG Layer-3 Audio Stream Decoding Overflow
2867| [66984] Microsoft Windows iccvid.dll VIDC (Cinepak) Codec Decompression Arbitrary Code Execution
2868| [66983] Microsoft Windows win32k.sys Driver xxxCreateWindowsEx hParent Value Handling Local Privilege Escalation
2869| [66982] Microsoft Windows win32k.sys Driver User Mode Input Unspecified Local Privilege Escalation
2870| [66981] Microsoft Windows win32k.sys Driver User Mode Copy Memory Allocation Local Privilege Escalation
2871| [66979] Microsoft Windows win32k.sys Driver GreStretchBltInternal() Handling Local DoS
2872| [66978] Microsoft Windows Tracing Feature for Services Registry String Handling Memory Corruption Local Privilege Escalation
2873| [66977] Microsoft Windows Tracing Feature for Services Registry Key ACL Local Privilege Escalation
2874| [66976] Microsoft Windows SMB Server Compounded Request Handling Stack Exhaustion Remote DoS
2875| [66975] Microsoft Windows SMB Server Crafted Packet Handling Unspecified Remote DoS
2876| [66974] Microsoft Windows SMB Server SMB_COM_TRANSACTION2 Request Handling Remote Code Execution
2877| [66973] Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling Memory Corruption
2878| [66934] Microsoft Windows win32k.sys CreateDIBPalette() Function Local Overflow
2879| [66458] Microsoft DirectX DirectPlay Unspecified NULL Dereference Remote DoS
2880| [66457] Microsoft DirectX DirectPlay Unspecified Packet Handling Remote DoS
2881| [66387] Microsoft Windows Shell LNK File Parsing Arbitrary Command Execution
2882| [66296] Microsoft Outlook SMB Attachment Handling Arbitrary Program Execution
2883| [66295] Microsoft IE / Office FieldList ActiveX (ACCWIZ.dll) Remote Code Execution
2884| [66294] Microsoft Office Access AccWizObjects ActiveX Remote Code Execution
2885| [66219] Microsoft Help Files (.CHM) Locked File Functionality Bypass
2886| [66003] Microsoft Windows win32k.sys NtUserCheckAccessForIntegrityLevel Use-After-Free Local Privilege Escalation
2887| [66001] Microsoft Windows mshtml.dll CTimeoutEventList::InsertIntoTimeoutList Local Pointer Disclosure
2888| [65794] Microsoft IE Cross-domain IFRAME Gadget Focus Change Restriction Weakness Keystroke Disclosure
2889| [65529] Microsoft Windows Help and Support Center sysinfo/sysinfomain.htm svr Parameter XSS
2890| [65503] Microsoft IE CImWebObj ActiveX Local Overflow DoS
2891| [65502] Microsoft IE Unspecified DoS
2892| [65441] Microsoft .NET ASP.NET Form Control __VIEWSTATE Parameter XSS
2893| [65343] Microsoft IE ICMFilter Arbitrary UNC File Access
2894| [65264] Microsoft Windows hcp:// Protocol Handler MPC::HexToNum() Function String Miscalculation Arbitrary Command Execution
2895| [65239] Microsoft Office Excel String Variable Handling Unspecified Code Execution
2896| [65238] Microsoft Office Excel Malformed RTD Handling Memory Corruption
2897| [65237] Microsoft Office Excel Malformed RTD Record Handling Memory Corruption
2898| [65236] Microsoft Office Excel Malformed OBJ Record Handling Overflow
2899| [65235] Microsoft Office Excel Malformed HFPicture Handling Memory Corruption
2900| [65234] Microsoft Office Excel on Mac OS X Open XML Permission Weakness
2901| [65233] Microsoft Office Excel Unspecified Memory Corruption (2010-0823)
2902| [65232] Microsoft Office Excel Malformed ExternName Record Handling Memory Corruption
2903| [65231] Microsoft Office Excel Malformed WOPT Record Handling Memory Corruption
2904| [65230] Microsoft Office Excel EDG / Publisher Record Handling Memory Corruption
2905| [65229] Microsoft Office Excel SxView Record Handling Memory Corruption
2906| [65228] Microsoft Office Excel ADO Object DBQueryExt Record Handling Arbitrary Code Execution
2907| [65227] Microsoft Office Excel SXVIEW Record Parsing Memory Corruption
2908| [65226] Microsoft Office Excel Unspecified Record Handling Stack Corruption Arbitrary Code Execution
2909| [65225] Microsoft Windows Kernel-Mode Driver Window Creation Local Privilege Escalation
2910| [65224] Microsoft Windows Kernel-Mode Driver Win32k.sys GetDCEx() Function Device Contexts (DC) Handling Local Privilege Escalation
2911| [65223] Microsoft Windows Kernel-Mode Driver TrueType Font Parsing Local Privilege Escalation
2912| [65222] Microsoft Windows MJPEG Media Decompression Unspecified Remote Code Execution
2913| [65221] Microsoft Windows Media Decompression Unspecified Remote Code Execution
2914| [65220] Microsoft SharePoint Crafted Request Help Page Invocation Remote DoS
2915| [65219] Microsoft Windows / Office COM Object Instantiation Validation Remote Code Execution
2916| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
2917| [65217] Microsoft Windows OpenType Compact Font Format (CFF) Driver Privilege Escalation
2918| [65215] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1259)
2919| [65214] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1261)
2920| [65213] Microsoft IE HTML Element Handling Memory Corruption
2921| [65212] Microsoft IE CStyleSheet Object Handling Memory Corruption
2922| [65211] Microsoft IE / Sharepoint toStaticHTML Information Disclosure
2923| [65150] Microsoft ASP.NET HtmlContainerControl InnerHtml Property Setting Weakness XSS
2924| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
2925| [65024] Microsoft Access Backslash Escaped Input SQL Injection Protection Bypass
2926| [65013] Microsoft .NET ASP.NET EnableViewStateMac Property Default Configuration XSS
2927| [64980] Microsoft Outlook Web Access (OWA) URI id Parameter Information Disclosure
2928| [64952] Microsoft IE img Tag Hijacking Weakness
2929| [64944] Microsoft Dynamics GP Default System Password
2930| [64928] Microsoft Windows SMB Client Transaction Response Handling Memory Corruption (2010-0476)
2931| [64927] Microsoft Windows SMB Client Transaction SMB_COM_TRANSACTION2 Response Handling Memory Corruption
2932| [64926] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0477)
2933| [64925] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0269)
2934| [64848] Microsoft Dynamics GP System Password Field Substitution Cipher Weakness
2935| [64828] Microsoft IE history go ActiveX Overflow DoS
2936| [64824] Microsoft IE Address Bar Character Conversion Spoofing Weakness
2937| [64794] Microsoft Multiple Products smtpsvc.dll DNS Implementation Predictable Transaction ID MitM DNS Response Spoofing Weakness
2938| [64793] Microsoft Multiple Products smtpsvc.dll DNS Implementation ID Transaction Validation MiTM DNS Response Spoofing Weakness
2939| [64786] Microsoft IE mailto: URL Multiple IFRAME Element Handling DoS
2940| [64731] Microsoft Windows Canonical Display Driver (cdd.dll) Unspecified Memory Corruption
2941| [64666] Microsoft IE Invisible Hand Extension HTTP Request Logging Cookie Product Search Disclosure
2942| [64539] Microsoft Office OCX ActiveX Controls OpenWebFile() Arbitrary Program Execution
2943| [64533] Microsoft IE document.createElement NULL Dereference DoS
2944| [64531] Microsoft Outlook Web Access (OWA) Path Traversal Attachment Handling Weakness
2945| [64530] Microsoft Outlook Express / Windows Mail STAT Response Overflow
2946| [64529] Microsoft Visual Basic for Applications VBE6.dll Single-Byte Stack Overwrite
2947| [64446] Microsoft Office Visio VISIODWG.DLL Crafted DXF File Handling Overflow
2948| [64391] Microsoft Windows Group Policy Management Editor Account Password Removal Weakness
2949| [64341] Microsoft Windows Unspecified SMB Negotiation Remote DoS
2950| [64340] Microsoft Windows RRAS InterfaceAdjustVLSPointers Null Dereference Remote DoS
2951| [64170] Microsoft SharePoint Server _layouts/help.aspx cid0 Parameter XSS
2952| [64083] Microsoft IE XSS Filter Script Tag Filtering Weakness
2953| [64058] Microsoft Windows win32k.sys SfnINSTRING() Local DoS
2954| [64057] Microsoft Windows win32k.sys Driver SfnLOGONNOTIFY() Function Local Privilege Escalation
2955| [63765] Microsoft Windows Media Player ActiveX fourCC Compression Code Codec Retrieval Arbitrary Code Execution
2956| [63749] Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow
2957| [63748] Microsoft Office Publisher 97 File Conversion TextBox Processing Overflow
2958| [63747] Microsoft Windows ISATAP Component IPv6 Tunneled Packet IP Address Spoofing Weakness
2959| [63746] Microsoft Windows Authenticode Signature Verification Cabview Manipulation Privilege Escalation
2960| [63745] Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validation Bypass
2961| [63742] Microsoft Office Visio Unspecified Index Calculation Memory Corruption
2962| [63741] Microsoft Office Visio Unspecified Attribute Validation Memory Corruption
2963| [63739] Microsoft Windows SMTP / Exchange Server Malformed Command Sequence Remote Information Disclosure
2964| [63738] Microsoft Windows SMTP / Exchange Server DNS Mail Exchanger (MX) Resource Record Handling Remote DoS
2965| [63736] Microsoft Windows Kernel Symbolic Link Value Processing Unspecified Local DoS
2966| [63735] Microsoft Windows Kernel Exception Handling Unspecified Local DoS
2967| [63733] Microsoft Windows Kernel Registry Link Symbolic Link Extraction Local Privilege Escalation
2968| [63732] Microsoft Windows Kernel Malformed Image Handling Local DoS
2969| [63731] Microsoft Windows Kernel Registry Hive Symbolic Link Creation Local Privilege Escalation
2970| [63730] Microsoft Windows Kernel Registry Key Validation Unspecified Local DoS
2971| [63729] Microsoft Windows Kernel Virtual Path Parsing Local DoS
2972| [63728] Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS
2973| [63726] Microsoft Windows Media Unicast Service Transport Packet Handling Remote Overflow
2974| [63522] Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Management Implementation Memory Location Protection Mechanism Restriction Bypass
2975| [63473] Microsoft IE XML Document Image Element SRC Attribute Unspecified Issue
2976| [63470] Microsoft IE Unspecified Arbitrary Code Execution (PWN2OWN)
2977| [63469] Microsoft IE DLL File Base Address Discovery Overflow (PWN2OWN)
2978| [63468] Microsoft Windows ANI Parser BITMAPINFO Header Crafted biClrUsed Value DoS
2979| [63428] Microsoft Wireless Keyboard MAC Address XOR Key Generation Weakness
2980| [63335] Microsoft IE Unspecified Uninitialized Memory Corruption
2981| [63334] Microsoft IE Post Encoding Information Disclosure
2982| [63333] Microsoft IE Unspecified Race Condition Memory Corruption
2983| [63332] Microsoft IE Object Handling Unspecified Memory Corruption (2010-0490)
2984| [63331] Microsoft IE HTML Object onreadystatechange Event Handler Memory Corruption
2985| [63330] Microsoft IE HTML Rendering Unspecified Memory Corruption
2986| [63329] Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::SecurityCHeckDataURL Function Memory Corruption
2987| [63328] Microsoft IE HTML Element Handling Cross-Domain Information Disclosure
2988| [63327] Microsoft IE CTimeAction Object TIME2 Handling Memory Corruption
2989| [63324] Microsoft IE createElement Method Crafted JavaScript NULL Dereference DoS
2990| [63231] Microsoft Windows Media Player Crafted AVI File Colorspace Conversion Memory Corruption
2991| [62855] Microsoft Windows HTML Help Control ActiveX chm File Handling Arbitrary Code Execution
2992| [62823] Microsoft Office Excel XLS File DbOrParamQry Record Parsing Overflow
2993| [62822] Microsoft Office Excel XLSX File ZIP Header Processing Memory Corruption
2994| [62821] Microsoft Office Excel FNGROUPNAME Record Handling Memory Corruption
2995| [62820] Microsoft Office Excel Workbook Globals Stream MDXSET Record Handling Overflow
2996| [62819] Microsoft Office Excel MDXTUPLE Record Handling Overflow
2997| [62818] Microsoft Office Excel Sheet Object Type Confusion Arbitrary Code Execution
2998| [62817] Microsoft Office Excel File Record Handling Unspecified Memory Corruption
2999| [62811] Microsoft Windows Movie Maker / Producer IsValidWMToolsStream() Function Project File (.MSWMM) Handling Overflow
3000| [62810] Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution
3001| [62756] Microsoft Windows VBScript MsgBox() Function helpfile Argument Arbitrary Command Execution
3002| [62660] Microsoft Windows Unspecified API Argument Validation Local DoS
3003| [62652] Microsoft Windows Media Player Crafted MPG File Handling Overflow DoS
3004| [62637] Microsoft Windows Malformed TCP SYN Packet Remote DoS (Blat)
3005| [62632] Microsoft Windows VBScript MsgBox() Function HLP File Arbitrary Command Execution
3006| [62466] Microsoft IE CSS Stylesheet Cross-origin Information Disclosure
3007| [62438] Google Gadget ActiveX Microsoft ATL Template Unspecified Arbitrary Code Execution
3008| [62400] Microsoft Wordpad Malformed RTF File Parsing Memory Exhaustion DoS
3009| [62259] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
3010| [62258] Microsoft Windows Kerberos Ticket-Granting-Ticket Renewal Request NULL Dereference Remote DoS
3011| [62257] Microsoft Windows DirectShow AVI File Decompression Overflow
3012| [62256] Microsoft Windows SMB Server Crafted Network Message Remote Code Execution
3013| [62255] Microsoft Windows SMB Server Crafted Packet Handling Remote DoS
3014| [62254] Microsoft Windows SMB Server Crafted Packet Handling NULL Dereference Remote DoS
3015| [62253] Microsoft Windows SMB Server NTLM Authentication Nonce Entropy Weakness
3016| [62252] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Session Termination Weakness Local Privilege Escalation
3017| [62251] Microsoft Windows Server 2008 Hyper-V Crafted Instruction Sequence DoS
3018| [62250] Microsoft Windows TCP/IP Stack ICMPv6 Router Advertisement Packet Handling Remote Code Execution
3019| [62249] Microsoft Windows TCP/IP Stack ESP Over UDP Header MDL Fragmentation Remote Code Execution
3020| [62248] Microsoft Windows TCP/IP Stack ICMPv6 Route Information Packet Handling Remote Code Execution
3021| [62247] Microsoft Windows TCP/IP Selective Acknowledgment (SACK) Value Handling Remote DoS
3022| [62246] Microsoft Data Analyzer ActiveX Web Page Handling Unspecified Arbitrary Code Execution
3023| [62245] Microsoft Windows Shell Handler ShellExecute API Crafted URL Arbitrary Command Execution
3024| [62244] Microsoft Windows SMB Client Negotiate Protocol Response Handling Remote Code Execution
3025| [62243] Microsoft Windows SMB Client Packet Handling Race Condition Remote Privilege Escalation
3026| [62242] Microsoft Windows Paint JPEG Image Decoding Overflow
3027| [62241] Microsoft Office Powerpoint TextBytesAtom Record Handling Remote Code Execution
3028| [62240] Microsoft Office Powerpoint TextCharsAtom Record Handling Remote Code Execution
3029| [62239] Microsoft Office Powerpoint File Path Handling Overflow
3030| [62238] Microsoft Office Powerpoint LinkedSlideAtom Handling Remote Code Execution
3031| [62237] Microsoft Office Powerpoint OEPlaceholderAtom placementId Parameter Handling Remote Code Execution
3032| [62236] Microsoft Office Powerpoint msofbtClientData Container OEPlaceholderAtom Use After Free Remote Code Execution
3033| [62235] Microsoft Office Excel MSO.DLL OfficeArtSpgr Container Overflow
3034| [62157] Microsoft IE text/html Content Type URLMON Sniffing Arbitrary File Access
3035| [62156] Microsoft IE Dynamic OBJECT Tag Cross-domain Arbitrary File Access
3036| [61914] Microsoft IE Javascript Cloned DOM Object Handling Memory Corruption
3037| [61913] Microsoft IE HTML Object Handling Unspecified Memory Corruption
3038| [61912] Microsoft IE Baseline Tag Rendering Memory Corruption
3039| [61911] Microsoft IE Table Layout Reuse Memory Corruption
3040| [61910] Microsoft IE Table Layout Col Tag Cache Update Handling Memory Corruption
3041| [61909] Microsoft IE Unspecified Crafted URL Handling Arbitrary Code Execution
3042| [61854] Microsoft Windows Virtual DOS Machine (VDM) Subsystem #GP Trap Handler (nt!KiTrap0D) Local Privilege Escalation
3043| [61697] Microsoft IE mshtml.dll Use-After-Free Arbitrary Code Execution (Aurora)
3044| [61676] Microsoft Windows Live Messenger msnmsgr.exe ActiveX (msgsc.14.0.8089.726.dll) ViewProfile Method MSN Messenger Session Remote DoS
3045| [61651] Microsoft Windows Embedded OpenType Font Engine LZCOMP Decompressor Font Handling Arbitrary Code Execution
3046| [61525] Microsoft Commerce Server ADMINDBPS Registry Key Encoded Password Local Disclosure
3047| [61037] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4312)
3048| [61036] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4311)
3049| [60858] Microsoft Windows Intel Indeo32 Codec (ir32_32.dll) IV32 FourCC Code Handling Heap Corruption
3050| [60857] Microsoft Windows Indeo Codec Unspecified Memory Corruption
3051| [60856] Microsoft Windows Intel Indeo41 Codec IV41 Stream Video Decompression Overflow
3052| [60855] Microsoft Windows Intel Indeo41 Codec IV41 movi Record Handling Overflow
3053| [60839] Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution
3054| [60838] Microsoft IE CSS Element Access Race Condition Memory Corruption
3055| [60837] Microsoft IE XHTML DOM Manipulation Memory Corruption
3056| [60836] Microsoft Windows Active Directory Federation Services (ADFS) Request Header Handling Remote Code Execution
3057| [60835] Microsoft Windows Active Directory Federation Services (ADFS) Single Sign-on Spoofing
3058| [60834] Microsoft WordPad / Office Text Converters Word97 File Handling Memory Corruption
3059| [60833] Microsoft Windows Internet Authentication Service Crafted MS-CHAP v2 Message Remote Authentication Bypass
3060| [60832] Microsoft Windows Internet Authentication Service Protected Extensible Authentication Protocol (PEAP) Message Handling Remote Memory Corruption
3061| [60831] Microsoft Windows Local Security Authority Subsystem (LSASS) ISAKMP Message Handling Resource Exhaustion Remote DoS
3062| [60830] Microsoft Office Project File Handling Memory Validation Arbitrary Code Execution
3063| [60660] Microsoft IE Response-Changing Mechanism Output Encoding XSS
3064| [60504] Microsoft IE PDF Export Title Property File Path Disclosure
3065| [60490] Microsoft IE Layout STYLE Tag getElementsByTagName Method Handling Memory Corruption
3066| [60401] Microsoft IE Crafted DHTML AnchorClick Attribute Handling Remote DoS
3067| [60397] Microsoft Outlook HTML Email CODEBASE Parameter Arbitrary Program Execution
3068| [60368] Microsoft Windows Terminal Services msgina.dll Unrestricted Resource Lock Remote DoS
3069| [60329] Microsoft Windows 2000 NetBIOS Continuation Packet Remote DoS
3070| [60295] Microsoft IE Image ICC Profile Tag Count Handling DoS
3071| [60294] Microsoft MSN Messenger Image ICC Profile Tag Count Handling DoS
3072| [60282] Microsoft Pocket IE (PIE) object.innerHTML Function Remote DoS
3073| [60225] Microsoft Windows XP System Restore Directory ACL Weakness Local Privilege Escalation
3074| [60210] Microsoft Windows Active Directory Malformed LDAP Client Request Remote DoS
3075| [60206] Microsoft Windows Fast User Switching (FUS) Arbitrary User Process Listing Disclosure
3076| [60198] Microsoft IE DHTML Property setHomePage Method JavaScript Loop Remote DoS
3077| [60150] IISPop Mail Server POP3 Connection Remote Overflow DoS
3078| [60145] Microsoft Windows NT cmd.exe CD Command Arbitrary Local Code Execution
3079| [60057] Microsoft Windows File Protection (WFP) Catalog File (.CAT) Modification Hash Code Comparison Bypass
3080| [60020] Microsoft Visual C++ MFC Static Library ISAPI Extension (Isapi.cpp) CHttpServer::OnParseError Overflow
3081| [60009] Macromedia ColdFusion MX on IIS jrun.dll HTTP Header Handling Remote Overflow DoS
3082| [60008] Macromedia ColdFusion MX on IIS jrun.dll Template File Name Handling Remote Overflow DoS
3083| [60004] Microsoft SQL Server Multiple Stored Procedure Unprivileged Configuration Manipulation
3084| [59996] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
3085| [59968] Microsoft Multiple Products SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
3086| [59957] Microsoft Windows SMB Response Handling Remote DoS
3087| [59886] Microsoft Exchange Malformed Microsoft Remote Procedure Call (MSRPC) Remote DoS
3088| [59869] Microsoft Windows Win32k Table of Directory Entry Building Font Code Parsing Remote Code Execution
3089| [59868] Microsoft Windows Win32k GDI Kernel Component Unspecified Local Privilege Escalation
3090| [59867] Microsoft Windows Win32k Unspecified Kernel System Call Local Privilege Escalation
3091| [59866] Microsoft Office Excel Document Record Parsing Memory Corruption
3092| [59865] Microsoft Windows Web Services on Devices API (WSDAPI) Message Header Handling Memory Corruption
3093| [59864] Microsoft Office Excel Malformed Record Object Sanitization Failure Arbitrary Code Execution
3094| [59863] Microsoft Office Excel Formula Handling Pointer Corruption Arbitrary Code Execution
3095| [59862] Microsoft Office Excel Cell Embeded Formula Parsing Memory Corruption
3096| [59861] Microsoft Office Excel BIFF Record Parsing Overflow
3097| [59860] Microsoft Office Excel BIFF File FEATHEADER cbHdrData Size Element Handling Memory Corruption
3098| [59859] Microsoft Office Excel SxView Record Handling Memory Corruption
3099| [59858] Microsoft Office Excel Malformed PivotCache Stream Handling Memory Corruption
3100| [59857] Microsoft Office Word Document Malformed File Information Block (FIB) Parsing Memory Corruption
3101| [59856] Microsoft Windows Active Directory Malformed LDAP Request Stack Exhaustion Remote DoS
3102| [59855] Microsoft Windows License Logging Server (llssrv.exe) RPC LlsrLicenseRequestW Method Remote Overflow
3103| [59819] Microsoft Windows RPC Session Handle Hijacking Remote Privilege Escalation
3104| [59808] Microsoft Exchange Request Saturation License Exhaustion Remote DoS
3105| [59774] Multiple Antivirus Microsoft Exchange Malformed E-mail X Header Scan Bypass
3106| [59738] Microsoft Windows ZIP Filename Handling Overflow DoS
3107| [59736] Microsoft Windows Media Player (WMP) on Solaris Installation Permission Weakness Local Privilege Escalation
3108| [59734] Microsoft Windows Log Clearning Function Admin Notification Weakness
3109| [59733] Microsoft Windows 2000 Terminal Services Screensaver Screen Minimization Locking Weakness
3110| [59732] Microsoft Windows Screensaver Domain Account Lock Verification Local Brute Force Weakness
3111| [59731] Microsoft Windows 2000 DCOM Client Alter Context Request Remote Information Disclosure
3112| [59730] Microsoft Windows 2000 Terminal Services Disconnect Feature Local Privilege Escalation
3113| [59653] Microsoft MN-500 Backup Function Cleartext Credential Local Disclosure
3114| [59636] Microsoft SQL Server SQL Authentication Password Encryption Weakness
3115| [59563] Microsoft Baseline Security Analyzer (MBSA) Security Scan Result Cleartext Local Disclosure
3116| [59515] Microsoft Windows csrss.exe Command Prompt Input Manipulation Forced Reboot DoS
3117| [59514] Microsoft Windows 2000 Task Manager Uppercase Process Name Termination Weakness
3118| [59513] Microsoft Windows NT winnt/system32 Write Access Local DoS (NT4ALL)
3119| [59509] Microsoft Windows 2000 Encrypted File System Cleartext Backup File Local Disclosure
3120| [59503] Microsoft IE Rendering Engine Crafted MIME Type Arbitrary Script Execution
3121| [59502] Microsoft IE / Outlook Express Crafted XML Stylesheet (XSL) Arbitrary Script Execution
3122| [59501] Microsoft IE MSScriptControl.ScriptControl / GetObject Frame Domain Validation Bypass
3123| [59500] Microsoft IE HTML Parser (MSHTML.DLL) Browser Window Object Handling DoS
3124| [59479] Microsoft Office SharePoint Server Team Services _layouts/download.aspx Multiple Parameter ASP.NET Source Disclosure
3125| [59347] Microsoft Windows SYSKEY Registry EFS Startup Key Disclosure
3126| [59346] Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
3127| [59340] Microsoft Windows NT Logon Box Account Name Disclosure
3128| [59333] Microsoft Windows NT Winlogon Key Local Shutdown DoS
3129| [59325] Microsoft Windows NT Scheduler Drive Mapping Permission Weakness Local Privilege Escalation
3130| [59323] Microsoft IE Active Movie ActiveX Arbitrary File Download
3131| [59322] Microsoft Jet Database Crafted Query Arbitrary Command Execution
3132| [59289] Microsoft Java Virtual Machine getSystemResourceAsStream Function Arbitrary File Access
3133| [59264] Microsoft Windows Crafted Fragmented Packet Stream Remote DoS (Jolt)
3134| [59263] Microsoft IE IMG Tag width Handling DoS
3135| [59260] Microsoft Windows NT SNMP Agent Query Saturation Remote DoS
3136| [59259] Microsoft Site Server / Commercial Internet System (MCIS) Cookie Expiry Weakness
3137| [59258] Microsoft Exchange ACL Modification Update Weakness
3138| [59250] Microsoft Windows NT Fragmented Packet Handling Remote DoS (ntfrag)
3139| [59241] Microsoft Windows CreateRemoteThread Function Arbitrary Writeable Process Termination DoS
3140| [58876] Microsoft Windows SMB Packet Command Value Handling Remote Code Execution
3141| [58875] Microsoft Windows SMBv2 Packet Handling Infinitie Loop Remote DoS
3142| [58874] Microsoft IE CSS Parsing writing-mode Style Memory Corruption
3143| [58873] Microsoft IE DOM Copy Constructor Event Object Initialization Memory Corruption
3144| [58872] Microsoft IE HTML Component Handling Arbitrary Code Execution
3145| [58871] Microsoft IE Data Stream Header Corruption Arbitrary Code Execution
3146| [58870] Microsoft Office BMP Image Color Processing Overflow
3147| [58869] Microsoft Office Malformed Object Handling Memory Corruption Arbitrary Code Execution
3148| [58868] Microsoft Multiple Products GDI+ PNG Image Handling Integer Overflow
3149| [58867] Microsoft Multiple Products GDI+ .NET API Code Execution Privilege Escalation
3150| [58866] Microsoft Multiple Products GDI+ TIFF Image Handling Memory Corruption Arbitrary Code Execution
3151| [58865] Microsoft Multiple Products GDI+ TIFF Image Handling Overflow
3152| [58864] Microsoft Multiple Products GDI+ PNG Image Handling Heap Overflow
3153| [58863] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
3154| [58862] Microsoft Windows LSASS Malformed NTLM Authentication Packets Remote Overflow DoS
3155| [58861] Microsoft Windows Kernel Exception Handler Unspecified Local DoS
3156| [58860] Microsoft Windows Kernel User Mode PE File Handling NULL Dereference Local Privilege Escalation
3157| [58859] Microsoft Windows Kernel 64-bit Value Conversion Truncation Local Privilege Escalation
3158| [58856] Microsoft Windows CryptoAPI X.509 Certificate Object Identifier Handling Overflow Spoofing Weakness
3159| [58855] Microsoft Windows CryptoAPI X.509 Certificate Common Name Null Truncation Spoofing
3160| [58854] Microsoft Windows Indexing Service ActiveX Memory Corruption Arbitrary Code Execution
3161| [58851] Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulation Arbitrary Code Execution
3162| [58850] Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
3163| [58849] Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary Code Execution
3164| [58845] Microsoft Windows Media Runtime Compressed Audio File Handling Heap Corruption Arbitrary Code Execution
3165| [58844] Microsoft Windows Media Player ASF Runtime Voice Sample Rate Handling Arbitrary Code Execution
3166| [58843] Microsoft Windows Media Player ASF Handling Overflow
3167| [58817] Microsoft IE Nested marquee Tag Handling DoS
3168| [58788] Microsoft IE Crafted File Extension Download Security Warning Bypass
3169| [58786] Microsoft Windows User Profile Unloading Session Persistence Weakness
3170| [58785] Microsoft Windows MFC Component (MFC42u.dll) AfxOleSetEditMenu Function RTF Malformed OLE Object Handling Overflow
3171| [58480] Microsoft IE X.509 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness
3172| [58399] Microsoft IE window.print Function Loop Remote DoS
3173| [58397] Microsoft IE Auto Form Submission KEYGEN Element Remote DoS
3174| [58350] Microsoft Patterns &
3175| [57806] Microsoft Windows Wireless LAN AutoConfig Service (wlansvc) Frame Parsing Arbitrary Code Execution
3176| [57804] Microsoft JScript Scripting Engine Memory Corruption Arbitrary Code Execution
3177| [57803] Microsoft Windows Media MP3 File Handling Memory Corruption
3178| [57802] Microsoft Windows Media ASF Header Parsing Invalid Free Arbitrary Code Execution
3179| [57799] Microsoft Windows srv2.sys Kernel Driver SMB2 Malformed NEGOTIATE PROTOCOL REQUEST Remote DoS
3180| [57798] Microsoft Windows DHTML Editing Component ActiveX Arbitrary Code Execution
3181| [57797] Microsoft Windows TCP/IP Orphaned Connection Handling Remote DoS
3182| [57796] Microsoft Windows TCP/IP Packet State Information Handling Remote Code Execution
3183| [57795] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
3184| [57742] Microsoft SQL Cleartext User Passwords Disclosure
3185| [57654] Microsoft IE JavaScript LI Element Creation Value Attribute Handling Remote DoS
3186| [57638] Microsoft Outlook Express IMAP Client literal_size Remote Overflow
3187| [57515] Microsoft IE window.open() New Window URL Path Spoofing Weakness
3188| [57506] Microsoft IE location.hash Javascript Handling Remote DoS
3189| [57500] Sophos PureMessage for Microsoft Exchange Scan Engine Load Handling Scan Protection Bypass
3190| [57499] Sophos PureMessage for Microsoft Exchange EdgeTransport.exe TNEF-Encoded Message Cleartext Conversion DoS
3191| [57493] Sophos PureMessage Scanner (PMScanner.exe) for Microsoft Exchange Crafted File Handling DoS
3192| [57142] Microsoft IE Malformed DIV / SCRIPT Element Handling DoS
3193| [57118] Microsoft IE onblur() / onfocusout() Functions Nested Loop DoS
3194| [57113] Microsoft IE Extended HTML Form Non-HTTP Protocol XSS
3195| [57064] Microsoft IE Crafted UTF-7 Context XSS Filter Bypass
3196| [57063] Microsoft IE Multiple CRLF Injected HTTP Header XSS Filter Bypass
3197| [57062] Microsoft IE STYLE Element / CSS Expression Property Double Content Injection XSS Filter Bypass
3198| [57016] Microsoft Windows win32k.sys Embedded OpenType Font Handling DoS
3199| [56916] Microsoft Office Web Components HTMLURL Parameter ActiveX Spreadsheet Object Handling Overflow
3200| [56915] Microsoft Office Web Components OWC10.Spreadsheet ActiveX BorderAround() Method Heap Corruption Arbitrary Code Execution
3201| [56914] Microsoft Office Web Components OWC10 ActiveX Loading/Unloading Memory Allocation Arbitrary Code Execution
3202| [56912] Microsoft Windows Terminal Services Client ActiveX Unspecified Overflow
3203| [56911] Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow
3204| [56910] Microsoft Visual Studio Active Template Library (ATL) Header Mismatch Remote Code Execution
3205| [56909] Microsoft Windows AVI Media File Parsing Unspecified Overflow
3206| [56908] Microsoft Windows Malformed AVI Header Parsing Arbitrary Code Execution
3207| [56905] Microsoft .NET Framework Request Scheduling Crafted HTTP Request Remote DoS
3208| [56904] Microsoft Windows Telnet NTLM Credential Reflection Remote Access
3209| [56902] Microsoft Windows Workstation Service NetrGetJoinInformation Function Local Memory Corruption Arbitrary Code Execution
3210| [56901] Microsoft Windows Message Queuing Service (MSMQ) mqac.sys IOCTL Request Parsing Local Privilege Escalation
3211| [56900] Microsoft Windows Internet Name Service (WINS) Network Packet Handling Remote Integer Overflow
3212| [56899] Microsoft Windows Internet Name Service (WINS) Push Request Handling Remote Overflow
3213| [56852] Microsoft IE XML Document start-tags Handling CPU Consumption DoS
3214| [56780] Microsoft Windows win32k.sys NtUserConsoleControl Function Memory Manipulation Local Privilege Escalation
3215| [56779] Microsoft IE mshtml.dll JavaScript findText Method Unicode String Handling DoS
3216| [56699] Microsoft Visual Studio Active Template Library (ATL) String Manipulation Arbitrary Memory Disclosure
3217| [56698] Microsoft Visual Studio Active Template Library (ATL) Data Stream Object Instantiation Remote Code Execution
3218| [56696] Microsoft Visual Studio Active Template Library (ATL) Headers VariantClear Corrupt Stream Handling Remote Code Execution
3219| [56695] Microsoft IE HTML Embedded CSS Property Modification Memory Corruption
3220| [56694] Microsoft IE Invalid HTML Object Element Appendage Handling Memory Corruption
3221| [56693] Microsoft IE timeChildren Object ondatasetcomplete Event Method Memory Corruption
3222| [56525] Microsoft Eyedog ActiveX Unspecified Overflow
3223| [56516] Microsoft Windows lpCmdLine Filename Whitespace Handling Weakness
3224| [56514] Microsoft Windows gzip Libraries Unspecified Remote Code Execution
3225| [56513] Microsoft Windows Autorun / NoDriveTypeAutoRun Registry Value Enforcement Weakness
3226| [56489] Microsoft IE Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
3227| [56485] Microsoft IE iFrame HTTP / HTTPS Content Detection Weakness
3228| [56480] Microsoft IE HTTP Response Refresh Header javascript: URI XSS
3229| [56438] Microsoft XML Core Services Set-Cookie HTTP Response Header Restriction Weakness
3230| [56432] Microsoft IE onclick Action Mouse Click Subversion (Clickjacking)
3231| [56323] Microsoft IE Write Method Unicode String Argument Handling Remote DoS
3232| [56272] Microsoft Video ActiveX (msvidctl.dll) Unspecified Remote Arbitrary Code Execution
3233| [56254] Microsoft IE Select Object Length Property Handling Memory Consumption DoS
3234| [55855] Microsoft IE AddFavorite Method URL Handling Remote DoS
3235| [55845] Microsoft DirectX DirectShow quartz.dll QuickTime NumberOfEntries Field Memory Corruption
3236| [55844] Microsoft DirectX DirectShow QuickTime File Pointer Validation Arbitrary Code Execution
3237| [55843] Microsoft Windows Embedded OpenType (EOT) Font Name Tables Parsing Overflow
3238| [55842] Microsoft Windows Embedded OpenType (EOT) Font Data Record Parsing Overflow
3239| [55838] Microsoft Office Publisher PUBCONV.DLL Legacy Format Importation Pointer Dereference Arbitrary Code Execution
3240| [55837] Microsoft Virtual PC / Virtual Server Instruction Decoding Unspecified Local Privilege Escalation
3241| [55836] Microsoft ISA Server 2006 Radius OTP Security Bypass
3242| [55806] Microsoft Office Web Components OWC10.Spreadsheet ActiveX msDataSourceObject() Method Memory Corruption
3243| [55651] Microsoft DirectShow Video Streaming ActiveX (msvidctl.dll) IMPEG2TuneRequest DirectX Object Interface Overflow
3244| [55645] Microsoft Windows Live Messenger (WLM) msnmsgr.exe Malformed Content-Type Header Remote DoS
3245| [55644] Microsoft Windows Live Messenger Client MSN Protocol over NAT Multiple Header Field Internal IP Disclosure
3246| [55345] Microsoft libc src/lib/libc/gen/fts.c fts_build() Function fts Nested Directory Handling Local DoS
3247| [55332] Microsoft Windows PPTP Server (Raspptpe.sys) Malformed Control Packet Remote DoS
3248| [55309] Microsoft Windows ICMP Type 9 Packet Remote DoS
3249| [55129] Microsoft IE HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
3250| [55050] Microsoft Windows win32k.sys Thread Handling Local Race Condition DoS
3251| [54961] Microsoft Office PowerPoint Freelance Windows Translator (FL21WIN.DLL) Layout Parsing Overflow
3252| [54960] Microsoft Office Word Malformed Record Handling Overflow (2009-0565)
3253| [54959] Microsoft Office Word Malformed Length Field Handling Overflow (2009-0563)
3254| [54958] Microsoft Office Excel BIFF File QSIR Record Object Pointer Handling Remote Code Execution
3255| [54957] Microsoft Office Excel File SST Record Handling String Parsing Overflow
3256| [54956] Microsoft Office Excel Record Object Field Sanitization Memory Corruption
3257| [54955] Microsoft Office Excel Malformed Records Handling Overflow
3258| [54954] Microsoft Office Excel Record Parsing Array Indexing Memory Corruption
3259| [54953] Microsoft Office Excel Malformed Object Record Corruption Remote Code Execution
3260| [54952] Microsoft Office Excel Malformed Record Object Pointer Handling Remote Code Execution (2009-0549)
3261| [54951] Microsoft IE Crafted HTML Malformed Row Property References Memory Corruption
3262| [54950] Microsoft IE Crafted onreadystatechange Event Memory Corruption
3263| [54949] Microsoft IE Crafted HTML Document Node Addition Event Handler Memory Corruption
3264| [54948] Microsoft IE setCapture Function Object Handling Uninitialized Memory Corruption
3265| [54947] Microsoft IE Crafted AJAX XMLHttpRequest Synchronization Memory Corruption
3266| [54946] Microsoft IE DHTML tr Element Handling Crafted Method Memory Corruption
3267| [54945] Microsoft IE Cached Data Handling Cross-Domain Information Disclosure
3268| [54944] Microsoft IE Race Condition Cross-Domain Information Disclosure
3269| [54943] Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escalation
3270| [54942] Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation
3271| [54941] Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation
3272| [54940] Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation
3273| [54939] Microsoft Office Works for Windows File Converter .wps Handling Overflow
3274| [54938] Microsoft Windows Active Directory Crafted LDAP(S) Request Handling Remote DoS
3275| [54937] Microsoft Windows Active Directory Crafted LDAP(S) Request Hexdecimal DN AttributeValue Handling Arbitrary Code Execution
3276| [54936] Microsoft Windows RPC Marshalling Engine Internal State Manipulation Remote Code Execution
3277| [54935] Microsoft Windows MSHTML Search Preview Display Information Disclosure
3278| [54934] Microsoft Windows Print Spooler Load Library Crafted RPC Message Arbitrary DLL Loading Privilege Escalation
3279| [54933] Microsoft Windows Print Spooler Crafted Separator Page Arbitrary Local File Disclosure
3280| [54932] Microsoft Windows Print Spooler win32spl.dll EnumeratePrintShares Function Remote Overflow
3281| [54931] Microsoft Windows SystemParametersInfo() Function SPI_*DESKWALLPAPER Call Local DoS
3282| [54797] Microsoft DirectX DirectShow quartz.dll QuickTime NULL Byte Overwrite Arbitrary Code Execution
3283| [54700] Microsoft GDI+ gdiplus.dll GpFont:etData Function Crafted EMF File Handling Off-by-one Overflow
3284| [54444] Apple Mac OS X Microsoft Office Spotlight Importer File Handling Memory Corruption
3285| [54394] Microsoft Office PowerPoint Multiple Record Types Handling Overflow
3286| [54393] Microsoft Office PowerPoint CurrentUserAtom Atom Parsing Multiple Overflows
3287| [54392] Microsoft Office PowerPoint Unspecified Crafted File Handling Heap Corruption
3288| [54391] Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Arbitrary Code Execution
3289| [54390] Microsoft Office PowerPoint BuildList Record Parsing Memory Corruption Arbitrary Code Execution
3290| [54389] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-1128)
3291| [54388] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-0225)
3292| [54387] Microsoft Office PowerPoint PPT95 Import (PP7X32.DLL) File Handling Multiple Overflows
3293| [54386] Microsoft Office PowerPoint PPT Importer (PP4X32.DLL) Legacy File Format Handling Multiple Overflows
3294| [54385] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) String Parsing Memory Corruption Arbitrary Code Execution
3295| [54384] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0227)
3296| [54383] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0223)
3297| [54382] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-0222)
3298| [54381] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-1137)
3299| [54292] Microsoft ActiveSync RNDIS over USB System Lock Bypass
3300| [54191] Microsoft Windows GDI+ PNG File Handling Infinite Loop DoS
3301| [54183] Microsoft IE Unprintable Character Document Handling DoS
3302| [53933] Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflow
3303| [53804] Microsoft Windows Media Player MID File Handling Overflow DoS
3304| [53750] Oracle Outside In Technology Microsoft Office File Optional Data Stream Parsing Overflow
3305| [53749] Oracle Outside In Technology Microsoft Office Spreadsheet Record Handling Overflow (2009-1010)
3306| [53748] Oracle Outside In Technology Microsoft Excel Spreadsheet Record Handling Remote Overflow (2009-1009)
3307| [53668] Microsoft Windows ThreadPool ACL Enforcement Weakness Local Privilege Escalation
3308| [53667] Microsoft Windows RPCSS Service Isolation Local Privilege Escalation
3309| [53666] Microsoft Windows Management Instrumentation (WMI) Service Isolation Local Privilege Escalation
3310| [53665] Microsoft Office Excel Malformed Object Handling Memory Corruption
3311| [53664] Microsoft WordPad Word 97 Text Converter File Handling Overflow
3312| [53663] Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack Corruption
3313| [53662] Microsoft WordPad / Office Text Converter Malformed Data Handling Memory Corruption
3314| [53637] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Forms Authentication Component Unspecified XSS
3315| [53636] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Web Proxy TCP State Handling DoS
3316| [53632] Microsoft DirectShow MJPEG Decompression Unspecified Arbitrary Code Execution
3317| [53627] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0554)
3318| [53626] Microsoft IE EMBED Element Handling Memory Corruption Arbitrary Code Execution
3319| [53625] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0552)
3320| [53624] Microsoft IE Page Transition Unspecified Memory Corruption Arbitrary Code Execution
3321| [53623] Microsoft Windows SearchPath File Open / Locating Unspecified Arbitrary Code Execution
3322| [53621] Microsoft Windows HTTP Services Digital Certificate Distinguished Name Mismatch Weakness
3323| [53620] Microsoft Windows HTTP Services Web Server Response Unspecified Integer Underflow
3324| [53619] Microsoft Windows HTTP Services NTLM Credential Replay Privileged Code Execution
3325| [53533] Microsoft Windows Task Manager (taskmgr.exe) I/O Activity Local Information Disclosure
3326| [53340] Microsoft IE JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness
3327| [53306] Microsoft Money prtstb06.dll ActiveX Startup Property Remote DoS
3328| [53248] Microsoft Windows DNS Server Crafted Packets Remote Memory Consumption DoS
3329| [53182] Microsoft Office PowerPoint PPT File Handling Unspecified Code Execution
3330| [52892] Microsoft IE on Windows Link Click Unspecified Arbitrary Code Execution (PWN2OWN)
3331| [52695] Microsoft Office Excel Crafted Document Invalid Object Reference Unspecified Code Execution
3332| [52694] Microsoft Windows Media Player Malformed GET Request DoS
3333| [52693] Microsoft Windows Mobile Bluetooth Stack OBEX FTP Service Traversal Arbitrary File Manipulation
3334| [52692] Microsoft SMB NT Trans2 Request Parsing Unspecified Remote Code Execution
3335| [52691] Microsoft SMB NT Trans Request Parsing Overflow Remote Code Execution
3336| [52690] Microsoft Office Word Malformed Table Property Handling Memory Corruption
3337| [52689] Microsoft Word Document Handling HTML Object Tag DoS
3338| [52688] Microsoft Word Document Handling HTML Object Tag XSS
3339| [52686] Microsoft Office Hyperlink Target Digital Signatures Weakness
3340| [52685] Microsoft Windows FTP Client Multiple Command Overflows
3341| [52684] Microsoft Forms Multiple ActiveX (FM20.dll) Memory Access Violations
3342| [52683] Microsoft Windows explorer.exe Malformed PNG Handling DoS
3343| [52682] Microsoft Windows Explorer ZIP Handler DoS
3344| [52681] Microsoft Windows Firewall sessmgr.exe Port Restriction Local Bypass
3345| [52671] Microsoft IE shell32 Module Unspecified Form Data Handling Overflow
3346| [52670] Microsoft IE Double Injection Bypass Anti-XSS Filter Bypass
3347| [52669] Microsoft IE UTF-7 Character Set Bypass Anti-XSS Filter Bypass
3348| [52668] Microsoft IE CRLF Injection Multiple Method Bypass Anti-XSS Filter Bypass
3349| [52667] Microsoft IE navcancl.htm Local Resource Refresh Link XSS
3350| [52666] Microsoft IE Malformed file:// URI Handling DoS
3351| [52665] Microsoft IE IObjectSafety Functionality Object Creation Call DoS
3352| [52664] Microsoft IE Relative Path Handling Spoofing Weakness
3353| [52663] Microsoft IE Crafted Pop-up Directional Address Bar Spoofing
3354| [52660] Microsoft IE about:blank Blank Tab Spoofing Weakness
3355| [52524] Microsoft Windows Invalid Pointer Local Privilege Escalation
3356| [52523] Microsoft Windows Handle Validation Local Privilege Escalation
3357| [52522] Microsoft Windows GDI Kernel Component Unspecified Remote Code Execution
3358| [52521] Microsoft Windows SChannel Certificate Based Authentication Spoofing Bypass
3359| [52520] Microsoft Windows WPAD WINS Server Registration Web Proxy MiTM Weakness
3360| [52519] Microsoft Windows DNS Server WPAD Registration Dynamic Update MiTM Weakness
3361| [52518] Microsoft Windows DNS Server Response Response Validation Transaction ID Prediction Weakness
3362| [52517] Microsoft Windows DNS Server Query Validation Spoofing
3363| [51840] Microsoft IE XHTML Strict Mode CSS Handling Memory Corruption Arbitrary Code Execution
3364| [51839] Microsoft IE Document Object Handling Memory Corruption Arbitrary Code Execution
3365| [51838] Microsoft Exchange Server EMSMDB2 Invalid MAPI Command Remote DoS
3366| [51837] Microsoft Exchange Server Message Transport Neutral Encapsulation Format (TNEF) Decoding Remote Code Execution
3367| [51836] Microsoft Office Visio File Opening Memory Functions Arbitrary Code Execution
3368| [51835] Microsoft Office Visio Object Data Memory Functions Arbitrary Code Execution
3369| [51834] Microsoft Office Visio File Opening Object Data Handling Arbitrary Code Execution
3370| [51503] Microsoft Word Save as PDF Add-on Emailed PDF Path Disclosure
3371| [51433] Microsoft Windows Crafted CHM File Handling Overflow
3372| [51320] Microsoft IE chromehtml: URI --renderer-path Option Arbitrary Command Execution
3373| [51277] Microsoft Excel HTML Tag Interpretation XSS
3374| [51259] Microsoft IE onload=screen["
3375| [51133] Microsoft Windows Media Player Multiple File Handling Remote Overflow
3376| [50974] Microsoft Outlook Express InetComm.dll MimeOleClearDirtyTree Function Malformed Email Header Handling Infinite Loop DoS
3377| [50959] Microsoft Word / Publisher Malformed wordart Handling DoS
3378| [50778] Microsoft Remote Help SAFRCFileDlg.RASetting ActiveX (safrcdlg.dll) GetProfileString Function Overflow
3379| [50745] Microsoft Office Web Controls OWC11.DataSourceControl Memory Access Violation
3380| [50622] Microsoft IE mshtml.dll XSML Nested SPAN Element Handling Unspecified Arbitrary Code Execution
3381| [50615] Microsoft ASP.NET Malformed File Request Path Disclosure
3382| [50613] Microsoft IE WebDAV Cached Content Request Parsing Overflow
3383| [50612] Microsoft IE Object Handling Uninitialized Memory Corruption
3384| [50611] Microsoft IE Navigation Methods Parameter Validation Memory Corruption
3385| [50610] Microsoft IE EMBED Tag File Name Extension Overflow
3386| [50598] Microsoft Office Word Table Property Handling Overflow
3387| [50597] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4031)
3388| [50596] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4030)
3389| [50595] Microsoft Office Word RTF Drawing Object Parsing Overflow
3390| [50593] Microsoft Office Word RTF Consecutive Drawing Object Parsing Memory Corruption
3391| [50592] Microsoft Office Word Malformed Value Memory Corruption
3392| [50591] Microsoft Office Word RTF Polyline/Polygon Object Parsing Overflow
3393| [50590] Microsoft Office Word Malformed File Information Block (FIB) lcbPlcfBkfSdt' Field Memory Corruption
3394| [50589] Microsoft SQL Server 2000 sp_replwritetovarbin() Stored Procedure Overflow
3395| [50585] Microsoft Office SharePoint Server Administrative URL Security Bypass
3396| [50581] Microsoft Visual Basic Charts Control ActiveX (Mschrt20.ocx) Unspecified Memory Corruption
3397| [50580] Microsoft Visual Basic Animation ActiveX (mscomct2.ocx) AVI Parsing Memory Corruption
3398| [50579] Microsoft Visual Basic Hierarchical FlexGrid ActiveX (mshflxgd.ocx) Multiple Method Memory Corruption
3399| [50578] Microsoft Visual Basic FlexGrid ActiveX (msflxgrd.ocx) Unspecified Memory Corruption
3400| [50577] Microsoft Visual Basic DataGrid ActiveX (msdatgrd.ocx) Unspecified Memory Corruption
3401| [50567] Microsoft Windows WordPad Text Converter Unspecified Memory Corruption
3402| [50566] Microsoft Windows Explorer search-ms Protocol Handler Arbitrary Code Execution
3403| [50565] Microsoft Windows Explorer Saved Search File Handling Arbitrary Code Execution
3404| [50562] Microsoft Windows GDI WMF Image Size Parameter Parsing Overflow
3405| [50561] Microsoft Windows GDI WMF Image Parsing Integer Math Overflow
3406| [50559] Microsoft Windows Media Component Crafted ISATAP Address NTLM Credential Disclosure
3407| [50558] Microsoft Windows Media Component Service Principal Name (SPN) Credential Reflection Arbitrary Code Execution
3408| [50557] Microsoft Excel NAME Record Global Array Parsing Memory Corruption
3409| [50556] Microsoft Excel Malformed Object Record Parsing Memory Corruption
3410| [50555] Microsoft Excel Malformed Formula Parsing Memory Corruption
3411| [50533] Microsoft Windows Media Services nskey.dll ActiveX CallHTMLHelp Method Overflow
3412| [50488] Microsoft Multiple Products Crafted RTCP Receiver Report Packet Handling Remote DoS
3413| [50330] Microsoft Communicator Instant Message Emoticon Saturation Remote DoS
3414| [50320] Microsoft Communicator SIP INVITE Request Handling Session Saturation DoS
3415| [50302] Microsoft .NET Framework Strong Name Implementation DLL File Public Key Token Subversion Multiple Mechanism Authentication Bypass
3416| [50287] Microsoft Windows Vista iphlpapi.dll CreateIpForwardEntry2() Function Memory Corruption
3417| [50280] Microsoft Windows UnhookWindowsHookEx Call Saturation Race Condition Local DoS
3418| [50279] Microsoft XML Core Services HTTP Request Header Field Cross-domain Session State Manipulation
3419| [50252] Microsoft Windows Media Player Crafted DAT File MThd Header Handling DoS
3420| [50251] Microsoft Windows Media Player Crafted MIDI File MThd Header Handling DoS
3421| [50138] Microsoft SharePoint Host Name / Port Number Persistence HTML Document Same-origin Relationship Bypass XSS
3422| [50074] Cisco Unity Unspecified Microsoft API Dynamic UDP Port Packet Handling Remote DoS
3423| [50044] Microsoft IE Non-Blocking Space Character Visual Truncation Address Bar Spoofing
3424| [50043] Microsoft IE High-bit URL Encoded Character Address Bar Spoofing
3425| [50000] Microsoft Windows Active Directory LDAP Server Bind Request User Account Enumeration
3426| [49926] Microsoft XML Core Services DTD Crafted XML Document Handling Cross-Domain Scripting Remote Information Disclosure
3427| [49897] Microsoft Windows Explorer Crafted ZIP File Handling DoS
3428| [49895] Microsoft Windows GDI+ gdiplus.dll Crafted ICO File Handling DoS
3429| [49736] Microsoft Windows SMB NTLM Authentication Credential Replay Remote Code Execution
3430| [49729] Microsoft Internet Authentication Service (IAS) Helper COM Component ActiveX (iashlpr.dll) PutProperty Method Remote DoS
3431| [49728] Microsoft IE Crafted URL-encoded String alert Function DoS
3432| [49592] Microsoft Office DjVu ActiveX (DjVu_ActiveX_MSOffice.dll) Multiple Property Overflow
3433| [49590] Microsoft Debug Diagnostic Tool DebugDiag ActiveX (CrashHangExt.dll) GetEntryPointForThread Method DoS
3434| [49586] Microsoft IE Mshtml.dll CDwnTaskExec::ThreadExec Function PNG File Handling DoS
3435| [49442] IBM Tivoli Storage Manager (TSM) Express for Microsoft SQL SQL CAD Data Protection (dsmcat.exe) Remote Overflow
3436| [49385] Microsoft ASP.NET Request Validation <
3437| [49384] Microsoft ASP.NET Request Validation <
3438| [49364] Cisco PIX / ASA Microsoft Windows NT VPN Domain Authentication Bypass
3439| [49243] Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution
3440| [49230] Microsoft Outlook Web Access (OWA) exchweb/bin/redir.asp URL Variable Arbitrary Site Redirect
3441| [49118] Microsoft IE HTML Object Handling Memory Corruption
3442| [49117] Microsoft IE componentFromPoint Unitialized Memory Corruption
3443| [49116] Microsoft IE Unspecified Cross-domain Information Disclosure
3444| [49115] Microsoft IE Unspecified Cross-domain Arbitrary Script Execution
3445| [49114] Microsoft IE Unspecified HTML Element Cross-Domain Code Execution
3446| [49113] Microsoft IE Window Location Property Cross-Domain Code Execution
3447| [49082] Microsoft PicturePusher ActiveX (PipPPush.DLL) Crafted PostURL Request Multiple Method Arbitrary File Upload
3448| [49078] Microsoft Excel Embedded Formula Parsing Arbitrary Code Execution
3449| [49077] Microsoft Excel Calendar Object Validation VBA Performance Cache Processing Arbitrary Code Execution
3450| [49076] Microsoft Excel BIFF File Malformed Object Handling Arbitrary Code Execution
3451| [49068] Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow
3452| [49061] Microsoft Windows Ancillary Function Driver (afd.sys) Local Privilege Escalation
3453| [49060] Microsoft Windows Message Queuing Service RPC Request Handling Remote Code Execution
3454| [49058] Microsoft Windows Active Directory LDAP(S) Request Handling Remote Overflow
3455| [49057] Microsoft Windows SMB File Name Handling Remote Underflow
3456| [49056] Microsoft Windows Kernel Memory Corruption Local Privilege Escalation
3457| [49055] Microsoft Windows Kernel New Window Creation Process Arbitrary Code Execution
3458| [49054] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
3459| [49053] Microsoft Windows Virtual Address Descriptors (VAD) Local Privilege Escalation
3460| [49052] Microsoft Office CDO Protocol (cdo:) Content-Disposition: Attachment Header XSS
3461| [48837] Microsoft Windows Vista Page Fault Handling DoS
3462| [48821] Microsoft Dynamics GP DPS Component DPS Message Remote Overflow
3463| [48820] Microsoft Dynamics GP DPM Component DPM Message Remote Overflow
3464| [48819] Microsoft Dynamics GP DPS Message Invalid Magic Number Remote DoS
3465| [48818] Microsoft IE Top Level Domain Cross-Domain Cookie Fixation
3466| [48789] Microsoft Windows Mobile Bluetooth Device Name Overflow DoS
3467| [48564] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
3468| [48359] Microsoft Windows Vista ASLR / DEP Memory Protection Bypass
3469| [48302] Microsoft Windows nslookup.exe DNS Zone Transfer Request Unspecified Arbitrary Code Execution
3470| [48220] Microsoft SQL Server SQLVDIRLib.SQLVDirControl ActiveX (Tools\Binn\sqlvdir.dll) Connect Method Overflow
3471| [48153] Microsoft Windows srv.sys WRITE_ANDX SMB Packet Handling Remote DoS
3472| [48037] Microsoft Windows Image Acquisition Logger ActiveX Open Method Arbitrary File Download
3473| [48009] Microsoft Windows Kernel IopfCompleteRequest API Overflow
3474| [48000] Microsoft Organization Chart orgchart.exe Crafted OPX File Handling DoS
3475| [47969] Microsoft Multiple Products GDI+ BMP Integer Calculation Overflow
3476| [47968] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
3477| [47967] Microsoft Multiple Products GDI+ GIF Image Handling Arbitrary Code Execution
3478| [47966] Microsoft Multiple Products GDI+ EMF File Handling Memory Corruption
3479| [47965] Microsoft Multiple Products GDI+ VML Gradient Size Handling Overflow
3480| [47964] Microsoft Office OneNote Protocol Handler (onenote://) URI Handling Arbitrary Code Execution
3481| [47963] Microsoft Windows Media Player Audio File Sampling Rate Remote Code Execution
3482| [47962] Microsoft Windows Media Encoder wmex.dll ActiveX Overflow
3483| [47856] Microsoft BitLocker BIOS Keyboard Buffer Local Password Disclosure
3484| [47475] Microsoft Visual Studio Masked Edit Control ActiveX (Msmask32.ocx) Mask Parameter Overflow
3485| [47419] Microsoft IE HTML Object Unspecified Memory Corruption
3486| [47418] Microsoft IE HTML Object Unspecified Memory Corruption
3487| [47417] Microsoft IE Object Handling Uninitialized Memory Corruption
3488| [47416] Microsoft IE HTML Document Objects Handling Memory Corruption
3489| [47415] Microsoft IE HTML Document Object Handling Memory Corruption
3490| [47414] Microsoft IE Print Preview HTML Component Handling Unspecified Arbitrary Code Execution
3491| [47413] Microsoft IE MHTML Protocol Handler Cross-Domain Information Disclosure
3492| [47412] Microsoft Windows Event System Crafted Request Array Index Handling Remote Privilege Escalation
3493| [47411] Microsoft Windows Event System Per-user Subscription Crafted Request Remote Privilege Escalation
3494| [47410] Microsoft Office Excel connections.xml Password String Persistence
3495| [47409] Microsoft Office Excel Spreadsheet AxesSet Record Memory Corruption
3496| [47408] Microsoft Office Excel File FORMAT Record Array Index Handling Arbitrary Code Execution
3497| [47407] Microsoft Office Excel File COUNTRY Record Value Parsing Arbitrary Code Execution
3498| [47406] Microsoft PowerPoint Viewer Cstring Object Handling Memory Corruption
3499| [47405] Microsoft PowerPoint Viewer Picture Index Handling Memory Corruption
3500| [47404] Microsoft PowerPoint File List Value Handling Memory Corruption
3501| [47403] Microsoft Windows Messenger ActiveX (Messenger.UIAutomation.1) Remote Privileged Operations
3502| [47402] Microsoft Office Filters PICT File Handling Arbitrary Code Execution
3503| [47401] Microsoft Office Filters Encapsulated PostScript (EPS) File Handling Arbitrary Code Execution
3504| [47400] Microsoft Office BMPIMP32.FLT Filter BMP File Header Handling Arbitrary Code Execution
3505| [47398] Microsoft Office Filters PICT File bits_per_pixel Field Heap Corruption
3506| [47397] Microsoft Office WPGIMP32.FLT Filter WordPerfect Graphics (WPG) File Handling Arbitrary Code Execution
3507| [47396] Microsoft Windows IPsec Policy Import Failure Cleartext Remote Information Disclosure
3508| [47395] Microsoft Windows Image Color Management System (MSCMS) mscms.dll InternalOpenColorProfile Function ICM Image File Handling Overflow
3509| [47299] Frisk F-PROT Antivirus Microsoft Office File Handling DoS
3510| [47004] Microsoft Crypto API S/MIME X.509 Certificate CRL Check Remote Information Disclosure
3511| [46990] Microsoft Windows Explorer (explorer.exe) Unspecified WMF Handling DoS
3512| [46935] Microsoft IE Pop Up Blocker Multiple Issues
3513| [46931] Microsoft Outlook/Express Unspecified URI Handling Arbitrary Command Injection
3514| [46914] Microsoft Word DOC File Handling Unspecified Arbitrary Code Execution
3515| [46827] Microsoft Visual Basic ActiveX (vb6skit.dll) fCreateShellLink Function Crafted lpstrLinkPath Argument Overflow
3516| [46801] Microsoft Windows Calendar Malformed ICS File Handling DoS
3517| [46780] Microsoft Outlook Web Access (OWA) HTML Parsing Unspecified XSS
3518| [46779] Microsoft Outlook Web Access (OWA) Data Validation Unspecified XSS
3519| [46778] Microsoft Windows DNS Query ID Field Prediction Cache Poisoning
3520| [46777] Microsoft Windows DNS Socket Entropy Weakness Cache Poisoning
3521| [46774] Microsoft Windows Explorer Saved Search File Handling DoS
3522| [46773] Microsoft SQL Server Memory Page Reuse Information Disclosure
3523| [46772] Microsoft SQL Server Convert Function Overflow
3524| [46771] Microsoft SQL Server Stored Backup File Processing Memory Corruption Arbitrary Code Execution
3525| [46770] Microsoft SQL Server Crafted Insert Statement Overflow
3526| [46749] Microsoft Access Snapshot Viewer ActiveX (snapview.ocx) PrintSnapshot Method Arbitrary Code Execution
3527| [46645] Microsoft Word DOC File Unordered List Handling Memory Corruption
3528| [46631] Microsoft IE Frame Location Handling Cross-frame Content Manipulation
3529| [46630] Microsoft IE location Window Object Handling XSS
3530| [46210] Microsoft Windows Installer msiexec.exe /uninstall Option GUID Value Overflow
3531| [46084] Microsoft IE Request Header Handling Cross-domain Information Disclosure
3532| [46083] Microsoft IE HTML Object Handling Memory Corruption Arbitrary Code Execution
3533| [46068] Microsoft Windows Pragmatic General Multicast (PGM) Fragment Handling Remote DoS
3534| [46067] Microsoft Windows Pragmatic General Multicast (PGM) Packet Handling Remote DoS
3535| [46066] Microsoft Windows Active Directory LDAP Request Processing Remote DoS
3536| [46065] Microsoft DirectX SAMI File Format Processing Arbitrary Code Execution
3537| [46064] Microsoft DirectX MJPEG Codec AVI/ASF File Processing Arbitrary Code Execution
3538| [46063] Microsoft Windows Internet Name Service (WINS) Packet Handling Local Privilege Escalation
3539| [46062] Microsoft Windows Speech Components (sapi.dll) Speech Recognition Code Execution
3540| [46061] Microsoft Windows Bluetooth SDP Packet Processing Remote Code Execution
3541| [45906] Microsoft ISA Server SOCKS4 Proxy Empty Packet Cross Session Destination IP Disclosure
3542| [45826] Microsoft IE Local Zone Saved File URI XSS
3543| [45814] Microsoft IE Arbitrary Website Zone Addition Domain Supression DoS
3544| [45813] Microsoft IE URI Arbitrary Scheme Name XSS Filter Bypass
3545| [45809] Microsoft Windows Vista Kernel Unspecified Remote Issue
3546| [45806] Microsoft Register Server (REGSVR) Crafted DLL Handling Unspecified Issue
3547| [45525] Microsoft IE Failed Connection DNS Pin Dropping Rebinding Weakness
3548| [45523] Microsoft Windows Live Messenger GDI Engine Malformed File Handling Overflow
3549| [45521] Microsoft Windows Explorer (explorer.exe) Malformed PNG Handling Remote DoS
3550| [45442] Microsoft IE IObjectSafety Java Plug-in ActiveX COM Object Creation DoS
3551| [45441] Microsoft IE IObjectSafety CLSID_ApprenticeICW ActiveX Control COM Object Creation DoS
3552| [45440] Microsoft IE IObjectSafety SmartConnect Class ActiveX Control COM Object Creation DoS
3553| [45439] Microsoft IE IObjectSafety System Monitor Source Properties ActiveX Control COM Object Creation DoS
3554| [45438] Microsoft IE IObjectSafety Outlook Progress Ctl ActiveX Control COM Object Creation DoS
3555| [45437] Microsoft IE Location DOM Object Page Load Interruption Site/Certificate Spoofing
3556| [45436] Microsoft IE URI Unspecified Scheme Traversal Arbitrary File Access
3557| [45435] Microsoft IE file: URI Absolute Traversal Arbitrary File Access
3558| [45280] Microsoft Windows Media Player (WMP) mplay32.exe MP3 Filename Handling Local Overflow
3559| [45264] Microsoft Office Publisher File Format Unspecified Remote Code Execution
3560| [45262] Microsoft ISA Server Host Header Log File Content Injection
3561| [45260] Microsoft IE Malformed Table Element CSS Attribute Handling DoS
3562| [45259] Microsoft IE mshtml.dll Malformed IFRAME XML File / XSL Stylesheet Handling DoS
3563| [45248] Microsoft IE JavaScript onUnload Document Structure Modification DoS
3564| [45218] Microsoft Outlook Web Access Cache-Control Directive Information Caching Persistence
3565| [45185] Microsoft Baseline Security Analyzer (MBSA) Reboot Race Condition Weakness
3566| [45074] Microsoft IE Print Table of Links Cross-Zone Scripting
3567| [45048] Microsoft Windows XP I2O Utility Filter Driver (i2omgmt.sys) Local Privilege Escalation
3568| [45033] Microsoft Publisher Object Handler Header Data Validation Arbitrary Code Execution
3569| [45032] Microsoft Word Document Malformed CSS Handling Memory Corruption Arbitrary Code Execution
3570| [45031] Microsoft Office RTF File Handling Object Parsing Arbitrary Code Execution
3571| [45028] Microsoft Malware Protection Engine File Parsing Disk-space Exhaustion DoS
3572| [45027] Microsoft Malware Protection Engine File Parsing Service DoS
3573| [45008] Microsoft Outlook E-mail Message Malformed Header / Body Separation Remote DoS
3574| [44985] RSA Authentication Agent WebID/IISWebAgentIF.dll FTP url Variable Arbitrary Site Redirect
3575| [44984] RSA Authentication Agent IISWebAgentIF.dll postdata Parameter URL-Encoded XSS
3576| [44979] Microsoft SQL Server Blank sa Password Set Weakness
3577| [44975] Microsoft Windows CE GIF Imaging Component Unspecified Arbitrary Code Execution
3578| [44974] Microsoft Windows CE JPEG (GDI+) Handling Unspecified Arbitrary Code Execution
3579| [44973] Microsoft IE DisableCachingOfSSLPages SSL Page Caching Persistence
3580| [44959] Microsoft Office on Mac OS X Installation Permission Bypass
3581| [44938] Microsoft Office Open XML (OOXML) Document Metadata Field Modification Signature Weakness
3582| [44880] Microsoft Windows msjet40.dll MDB File Handling Overflow
3583| [44652] Microsoft HeartbeatCtl HRTBEAT.OCX ActiveX Unspecified Method Host Argument Overflow
3584| [44580] Microsoft Windows Microsoft Distributed Transaction Coordinator (MSDTC) SeImpersonatePrivilege User Right Local Privilege Escalation
3585| [44459] Microsoft Sharepoint Rich Text Editor Picture Source XSS
3586| [44458] Microsoft Works WkImgSrv.dll WksPictureInterface Property Remote DoS
3587| [44319] Microsoft Office Publisher Crafted PUB File Handling DoS
3588| [44303] Microsoft IE body Tag Infinite Loop DoS
3589| [44215] Microsoft Windows GDI EMF Filename Parameter Handling Overflow
3590| [44214] Microsoft Windows GDI WMF Handling CreateDIBPatternBrushPt Function Overflow
3591| [44213] Microsoft Windows GDI (gdi32.dll) EMF File Handling Multiple Overflows
3592| [44212] Microsoft Project File Handling Unspecified Arbitrary Code Execution
3593| [44211] Microsoft Vbscript.dll VBScript Decoding Code Execution
3594| [44210] Microsoft Jscript.dll JScript Arbitrary Code Execution
3595| [44206] Microsoft Windows Kernel Unspecified Privilege Escalation
3596| [44205] Microsoft IE Data Stream Handling Memory Corruption
3597| [44200] Microsoft Windows Random Number Generator (RNG) CryptGenRandom Function Prediction Weakness
3598| [44172] Microsoft Windows DNS Client Predictable Transaction ID Spoofing
3599| [44171] Microsoft Windows HxTocCtrl ActiveX (hxvz.dll) Memory Corruption
3600| [44170] Microsoft Visio DXF File Handling Memory Validation Arbitrary Code Execution
3601| [44169] Microsoft Visio Object Header Data Handling Arbitrary Code Execution
3602| [44150] Microsoft Access Crafted MDB File Handling Overflow
3603| [44018] Microsoft Windows Vista SP1 Page Protection Unspecified Bypass
3604| [43844] RSA SecurID WebID RSA Authentication Agent (IISWebAgentIF.dll) postdata Variable Blacklist Bypass
3605| [43773] Microsoft Windows Explorer (explorer.exe) GIF File Handling Remote DoS
3606| [43715] Microsoft Windows Media Player (WMP) AIFF File Handling DoS
3607| [43606] Microsoft IE XMLHttpRequest() Multiple Header Overwrite HTTP Response Splitting
3608| [43605] Microsoft IE Chunked Transfer-Encoding Request Smuggling
3609| [43603] Microsoft Windows DNS Server Dynamic Update Mechanism Client Authentication Bypass
3610| [43521] Microsoft IE CSS :visited Pseudo-class Browser History Disclosure
3611| [43471] Microsoft IE Digest Authentication username Attribute CRLF Injection
3612| [43464] Microsoft Jet Database Engine Word File Handling Unspecified Code Execution
3613| [43434] Microsoft Windows Vista NoDriveTypeAutoRun Auto-Play Bypass
3614| [43325] Microsoft Atlas Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
3615| [43314] Microsoft IE JavaScript Long String Regex Match Remote DoS
3616| [43307] Microsoft Windows Explorer (explorer.exe) AVI Handling Right-Click Action DoS
3617| [43068] Microsoft Access MDB File Handling Unspecified Arbitrary Code Execution
3618| [42920] Hosting Controller /IIS/iibind.asp Arbitrary Site Host Header Manipulation
3619| [42799] Microsoft IE URI Handling Arbitrary FTP Command Injection
3620| [42732] Microsoft Excel Macro Validation Unspecified Code Execution
3621| [42731] Microsoft Excel Conditional Formatting Value Unspecified Code Execution
3622| [42730] Microsoft Excel BIFF File Format Rich Text Tag Malformed Tag Memory Corruption
3623| [42725] Microsoft Excel XLS Malformed Formula Memory Corruption
3624| [42724] Microsoft Excel Style Record Handling Memory Corruption
3625| [42723] Microsoft Excel SLK File Import Unspecified Arbitrary Code Execution
3626| [42722] Microsoft Excel BIFF8 Spreadsheet DVAL Record Handling Arbitrary Code Execution
3627| [42712] Microsoft Office Web Components DataSource Page Handling Arbitrary Code Execution
3628| [42711] Microsoft Office Web Components URL Parsing Arbitrary Code Execution
3629| [42710] Microsoft Outlook mailto: URI Handling Arbitrary Command Execution
3630| [42709] Microsoft Office Unspecified Malformed Document Handling Memory Corruption
3631| [42708] Microsoft Office Excel Document (XLS) Cell Record Rebuilding Memory Corruption
3632| [42579] 3ivx MPEG-4 on Microsoft Windows Media Player (WMP) mplayer2.exe MP4 File Handling Overflow
3633| [42152] Microsoft Silverlight ActiveX Unspecified Overflow
3634| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
3635| [41553] Microsoft Windows Explorer BMP Width Dimension Handling Overflow
3636| [41491] Microsoft Windows Vista Crafted DHCP Response DoS
3637| [41468] Microsoft FoxPro ActiveX Web Page Parsing Unspecified Memory Corruption
3638| [41467] Microsoft IE Image Processing Argument Validation Unspecified Memory Corruption
3639| [41466] Microsoft IE animateMotion.by SVG Element by Property Memory Corruption
3640| [41465] Microsoft IE HTML Layout Rendering Unspecified Memory Corruption
3641| [41464] Microsoft Word Document Handling Unspecified Memory Corruption
3642| [41463] Microsoft Windows OLE Automation Unspecified Memory Corruption Remote Code Execution
3643| [41462] Microsoft Office Malformed Object Parsing Memory Corruption
3644| [41461] Microsoft Active Directory / ADAM Malformed LDAP Request Remote DoS
3645| [41460] Microsoft WebDAV Mini-Redirector Response Handling Arbitrary Code Execution
3646| [41459] Microsoft Works File Converter .wps File Multiple Field Handling Arbitrary Code Execution
3647| [41458] Microsoft Works File Converter .wps File Header Index Table Handling Arbitrary Code Execution
3648| [41457] Microsoft Works File Converter .wps Format Header Handling Arbitrary Code Execution
3649| [41447] Microsoft Office Publisher Memory Index Validation .pub File Handling Arbitrary Code Execution
3650| [41446] Microsoft Office Publisher .pub File Handling Arbitrary Code Execution
3651| [41382] Microsoft IE OnKeyDown JavaScript htmlFor Attribute Keystroke Disclosure
3652| [41156] Microsoft Windows x64 Kernel PatchGuard Bypass
3653| [41155] Microsoft Windows Hardware-enforced DEP Bypass
3654| [41154] Microsoft Windows XP EFS Cleartext Password Storage
3655| [41097] Microsoft Windows Task Scheduler (at.exe) Local Privilege Escalation
3656| [41093] Microsoft Windows Media Player (WMP) MSIE Static Invocation HTML Rendering Weakness
3657| [41092] Microsoft Windows DNS Service Predictable Transaction ID Weakness
3658| [41090] Microsoft Windows w/ IE7 Shell32.dll Crafted URL Third-party Application Arbitrary Command Execution
3659| [41080] Microsoft Visual Database Tools MSVDTDatabaseDesigner7 ActiveX (VDT70.DLL) NotSafe Function Arbitrary Code Execution
3660| [41065] Microsoft Windows kernel32.dll Multiple Function DoS
3661| [41064] Microsoft Windows ntdll.dll Multiple Function DoS
3662| [41060] Microsoft .NET Unspecified XSS Filter Bypass
3663| [41059] Microsoft Windows ARP Saturation Remote DoS
3664| [41053] Microsoft Visual Basic vbp File Company Name Field Processing Overflow
3665| [41052] Microsoft Visual Basic vbp File Description Field Processing Overflow
3666| [41048] Microsoft IE Content-Disposition HTML File Handling XSS
3667| [41047] Microsoft IE mshtml Malformed HTML Tag DoS
3668| [41041] Microsoft IE Mouse Click self.resizeTo DoS
3669| [41040] Microsoft IE onclick Self Referencing Button Infinite Loop DoS
3670| [41036] Microsoft IE DLL Search Path Subversion Local Privilege Escalation
3671| [41035] Microsoft IE onload Localhost DoS
3672| [41026] Microsoft IE GET Request Overflow
3673| [41025] Microsoft IE Drag and Drop Arbitrary Program Execution
3674| [41024] Microsoft IE Cross Zone Domain Resolution Weakness
3675| [40735] Apple Mac OS X Microsoft Office Spotlight Importer XLS Handling Memory Corruption
3676| [40531] Microsoft Visual Basic DSR File Handling Remote Code Execution
3677| [40381] Microsoft Visual FoxPro VFP_OLE_Server ActiveX foxcommand Method Arbitrary Code Execution
3678| [40380] Microsoft Visual FoxPro ActiveX (vfp6r.dll) DoCmd Method Arbitrary Command Execution
3679| [40352] Microsoft Visual InterDev SLN File Long Project Line Arbitrary Code Execution
3680| [40344] Microsoft Excel Malformed Header File Handling Remote Code Execution
3681| [40234] Microsoft Rich Textbox Control (RICHTX32.OCX) SaveFile Method Arbitrary File Overwrite
3682| [40071] Microsoft Windows LSASS Crafted LPC Request Local Privilege Escalation
3683| [40070] Microsoft Windows TCP/IP IGMPv3 / MLDv2 Packet Handling Remote Code Execution
3684| [40069] Microsoft Windows TCP/IP ICMP RDP Packet Handling Remote DoS
3685| [39900] Microsoft Web Proxy Auto-Discovery (WPAD) Crafted DNS MitM Weakness
3686| [39521] Cisco Security Agent for Microsoft Windows Crafted SMB Packet Remote Overflow
3687| [39131] Microsoft Windows Media Player Crafted AU File Application Crash Remote DoS
3688| [39127] Microsoft Windows DirectX WAV / AVI File Parsing Arbitrary Code Execution
3689| [39126] Microsoft Windows DirectX SAMI File Parsing Arbitrary Code Execution
3690| [39125] Microsoft Windows Vista SMBv2 Signing Unspecified Remote Code Execution
3691| [39124] Microsoft Windows Vista Kernel Legacy Reply Path Validation Local Privilege Escalation
3692| [39123] Microsoft Windows Message Queuing MSMQ Message Handling Arbitrary Code Execution
3693| [39122] Microsoft Windows Media Format Runtime ASF Parsing Arbitrary Code Execution
3694| [39121] Microsoft IE DHTML Object Memory Corruption
3695| [39120] Microsoft IE Element Tag Uninitialized Memory Corruption
3696| [39119] Microsoft IE Object cloneNode / nodeValue Function Uninitialized Memory Corruption
3697| [39118] Microsoft IE Object setExpression Function Memory Corruption
3698| [39014] Microsoft Windows RunAs Command Local Arbitrary Process DoS
3699| [38991] Microsoft Windows PNG Image IHDR block Multiple Crafted Value Remote DoS
3700| [38955] Microsoft IE history.length Variable History Disclosure
3701| [38954] Microsoft Excel Sheet Name Unspecified Code Execution
3702| [38953] Microsoft IE Document Variable Overwrite Same Origin Policy Bypass
3703| [38499] Microsoft Windows Mobile ActiveSync USB Weak PIN/Password Encryption
3704| [38497] Microsoft IE Page Transaction Race Condition Arbitrary Code Execution
3705| [38496] Microsoft Sysinternals DebugView Dbgv.sys Local Privilege Escalation
3706| [38495] Microsoft IE Outlook Express Address Book Activex DoS
3707| [38494] Microsoft Windows Graphics Device Interface (GDI+, GdiPlus.dll) ICO Handling DoS
3708| [38493] Microsoft IE HTML Popup Window (mshtml.dll) DoS
3709| [38488] Microsoft ISA Server File Extension Filter Bypass
3710| [38487] Microsoft Visual FoxPro ActiveX (FPOLE.OCX) FoxDoCmd Function Arbitrary Command Execution
3711| [38486] Microsoft Expression Media IVC File Cleartext Catalog Password Disclosure
3712| [38471] Microsoft Office MSODataSourceControl ActiveX DeleteRecordSourceIfUnused Method Overflow
3713| [38399] Microsoft SQL Server Enterprise Manager Distributed Management Objects OLE DLL ActiveX (sqldmo.dll) Start Method Arbitrary Code Execution
3714| [38212] Microsoft IE document.open() Function Address Bar Spoofing
3715| [38211] Microsoft IE with Netscape navigatorurl URI Cross-browser Command Execution
3716| [38018] Microsoft IE with Mozilla SeaMonkey Cross-browser Command Execution
3717| [38017] Microsoft IE with Mozilla Firefox Cross-browser Command Execution
3718| [37638] Microsoft IE res:// URI Image Object Local File Enumeration
3719| [37637] Microsoft Windows Crafted HLP File Overflow
3720| [37636] Microsoft IE Crafted JavaScript for Loop Null Pointer DoS
3721| [37635] Microsoft Windows Virtual DOS Machine (VDM) PhysicalMemory Race Condition Local Privilege Escalation
3722| [37634] Microsoft Word Crafted Document Unspecified Resource Consumption DoS
3723| [37633] Microsoft Word wwlib.dll Crafted Document Overflow DoS
3724| [37632] Microsoft Word Unspecified Memory Corruption
3725| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
3726| [37630] Microsoft SharePoint PATH_INFO (query string) XSS
3727| [37629] Microsoft Windows 2000 RPC Authentication Unspecified Information Disclosure
3728| [37628] Microsoft Windows 2000 RPC Authentication Crafted Request Remote DoS
3729| [37627] Microsoft Windows Kodak Image Viewer Image File Handling Arbitrary Code Execution
3730| [37626] Microsoft IE Unspecified Address Bar Spoofing
3731| [37625] Microsoft IE File Download Queue Handling Use-After-Free Arbitrary Code Execution
3732| [37148] Microsoft TSAC ActiveX connect.asp Unknown XSS
3733| [37107] Microsoft Visual Studio VB To VSI Support Library ActiveX (VBTOVSI.DLL) SaveAs Method Arbitrary File Manipulation
3734| [37106] Microsoft Visual Studio ActiveX (PDWizard.ocx) Multiple Method Arbitrary Program Execution
3735| [37105] Microsoft Windows mfc42.dll / mfc42u.dll CFileFind Class FindFile() Function Overflow
3736| [36938] Microsoft Windows XP Kernel Process Scheduler Local DoS
3737| [36937] Microsoft Windows / IE ActiveX (triedit.dll) Multiple Property NULL Pointer DoS
3738| [36936] Microsoft Visual Basic VBP File Handling Overflow
3739| [36935] Microsoft Windows Services for UNIX Local Privilege Escalation
3740| [36934] Microsoft Agent URL Handling Remote Code Execution
3741| [36847] PHP iisfunc Extension php_iisfunc.dll Multiple Function Overflow
3742| [36400] Microsoft IE HTML FTP Credential Disclosure
3743| [36399] Microsoft DirectX Media SDK DXSurface.LivePicture.FlashPix.1 (DirectTransform FlashPix) ActiveX SourceUrl Property Overflow
3744| [36398] Microsoft IE FTP Unspecified Remote Memory Address Disclosure
3745| [36397] Microsoft IE Crafted CSS Unspecified Memory Corruption
3746| [36396] Microsoft IE ActiveX tblinf32.dll Unspecified Arbitrary Code Execution
3747| [36395] Microsoft IE ActiveX (pdwizard.ocx) Unspecified Memory Corruption
3748| [36394] Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow
3749| [36393] Microsoft Windows Vista Weather Gadgets Crafted HTML Attribute Unspecified Issue
3750| [36392] Microsoft Windows Vista Contacts Gadget Crafted Contact Information Arbitrary Code Execution
3751| [36391] Microsoft Windows Vista Feed Headlines Gadgets RSS Feed XSS
3752| [36390] Microsoft Windows Vector Markup Language (VML) VGX.DLL CDownloadSink Class Overflow
3753| [36389] Microsoft Virtual PC Guest Administrator Unspecified Local Privilege Escalation
3754| [36388] Microsoft Windows Graphics Rendering Engine (GDI) Metafile Image Handling Overflow
3755| [36387] Microsoft Windows OLE Automation TextNode Object substringData Method Overflow
3756| [36386] Microsoft Windows Media Player Skin File Handling Crafted Header Arbitrary Code Execution
3757| [36385] Microsoft Windows Media Player Skin File Handling Overflow
3758| [36383] Microsoft Excel Workspace rtWnDesk Record Memory Corruption
3759| [36151] Microsoft DirectX RLE Compressed Targa Image Processing Overflow
3760| [36149] Microsoft IE on Windows Mobile Unspecified Overflow DoS
3761| [36148] Microsoft Windows Mobile Pictures and Videos Malformed JPEG DoS
3762| [36147] Microsoft IE Zone Domain Specification DoS
3763| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
3764| [36145] Microsoft Windows Event Viewer (eventvwr.exe) Log Data Exclusion
3765| [36144] Microsoft Windows Bluetooth Unspecified Remote Privilege Escalation
3766| [36143] Microsoft Windows Mobile Pocket PC Edition Unspecified Remote Privilege Escalation
3767| [36142] Microsoft IE IDN Site Basic Authentication Status Bar Truncation Spoofing
3768| [36141] Microsoft Windows Explorer Ole32.dll Crafted Document Summary Information DoS
3769| [36138] Microsoft Windows Active Directory Time Restriction User Enumeration
3770| [36034] Microsoft Office 2000 Controllo ActiveX (OUACTRL.OCX) HelpPopup Method Overflow
3771| [35962] Microsoft Windows XP Registry QHEADLES Permission Weakness
3772| [35961] Microsoft Windows Active Directory LDAP Service Crafted Request Remote DoS
3773| [35960] Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote Code Execution
3774| [35959] Microsoft Excel Viewer WorkBook Workspace Designation Memory Corruption
3775| [35958] Microsoft Excel Multiple Worksheet Unspecified Memory Corruption
3776| [35957] Microsoft Excel Version Information Validation Crafted File Arbitrary Code Execution
3777| [35956] Microsoft .NET Framework Just In Time (JIT) Compiler Service Unspecified Arbitrary Code Execution
3778| [35955] Microsoft .NET Framework NULL Byte URL Arbitrary File Access
3779| [35954] Microsoft .NET Framework PE Loader Service Unspecified Arbitrary Code Execution
3780| [35953] Microsoft Office Publisher .pub Page Data Handling Arbitrary Code Execution
3781| [35952] Microsoft Windows Vista Teredo Crafted IPv6 Traffic Blocking Rule Bypass
3782| [35763] Microsoft PowerPoint Unspecified Arbitrary Code Execution
3783| [35637] Microsoft Windows Unspecified Remote Code Execution
3784| [35568] Microsoft IE Script Variable Length DoS
3785| [35353] Microsoft IE Speech API 4 Xlisten.dll / Xvoice.dll Memory Corruption
3786| [35352] Microsoft IE navcancl.htm res: URI Phishing
3787| [35351] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution
3788| [35350] Microsoft IE Multiple Language Pack Installation Race Condition Code Execution
3789| [35349] Microsoft IE Crafted CSS Tag Handling Memory Corruption
3790| [35348] Microsoft IE Urlmon.dll COM Object Instantiation Memory Corruption
3791| [35347] Microsoft Windows Schannel Security Package Crafted Digital Signature Arbitrary Code Execution
3792| [35346] Microsoft Outlook Express / Windows Mail MHTML Content Disposition Parsing Cross Domain Information Disclosure
3793| [35345] Microsoft Outlook Express / Windows Mail URL Parsing Cross Domain Information Disclosure
3794| [35344] Microsoft Windows Vista Local User Information Data Stores Information Disclosure
3795| [35343] Microsoft Visio Document Handling Crafted Packed Object Arbitrary Code Execution
3796| [35342] Microsoft Visio Document Handling Crafted Version Number Arbitrary Code Execution
3797| [35341] Microsoft Windows Win32 API Unspecified Remote Code Execution
3798| [35269] Microsoft ASP .NET Framework Comment Enclosure Handling Request Weakness
3799| [34963] Microsoft IE CCRP BrowseDialog Server (ccrpbds6.dll) ActiveX Multiple Property DoS
3800| [34959] Microsoft Xbox 360 Hypervisor Syscall Bypass Arbitrary Code Access
3801| [34885] Apache Tomcat on IIS Servlet Engine MS-DOS Device Request DoS
3802| [34830] Microsoft Outlook Recipient ActiveX (ole32.dll) Crafted HTML DoS
3803| [34490] Microsoft Windows Explorer Folder Browsing WMV Handling DoS
3804| [34489] Microsoft Office 2003 Malformed WMF File Handling DoS
3805| [34488] Microsoft Excel 2003 XLS Handling Corrupt Format DoS
3806| [34407] Adobe Acrobat Reader Plugin for Microsoft IE Microsoft.XMLHTTP ActiveX CLRF Injection
3807| [34404] Microsoft IE Media Service Component Arbitrary File Rewrite
3808| [34403] Microsoft IE HTML CMarkup Objects Unspecified Memory Corruption
3809| [34402] Microsoft IE HTML Objects Unspecified Memory Corruption
3810| [34401] Microsoft IE Property Method Handling Memory Corruption
3811| [34400] Microsoft IE Uninitialized Object Memory Corruption
3812| [34399] Microsoft IE COM Object Instantiation Memory Corruption (931768)
3813| [34397] Microsoft CAPICOM CAPICOM.Certificates ActiveX (CAPICOM.dll) Remote Code Execution
3814| [34396] Microsoft Office Crafted Drawing Object Arbitrary Code Execution
3815| [34395] Microsoft Excel Filter Record Handling Remote Code Execution
3816| [34394] Microsoft Office Excel Set Font Handling Remote Code Execution
3817| [34393] Microsoft Excel BIFF Record Named Graph Record Parsing Overflow
3818| [34392] Microsoft Exchange Server IMAP Literal Processing DoS
3819| [34391] Microsoft Exchange Server MIME Decoding Remote Code Execution
3820| [34390] Microsoft Exchange Server MODPROPS Malformed iCal DoS
3821| [34389] Microsoft Exchange Outlook Web Access (OWA) Attachment Script Injection
3822| [34388] Microsoft Word RTF Rich Text Properties Parsing Remote Code Execution
3823| [34387] Microsoft Word Data Array Handling Remote Code Execution
3824| [34386] Microsoft Word Malformed Drawing Object Arbitrary Code Execution
3825| [34385] Microsoft Word Macro Content Arbitrary Code Execution
3826| [34103] Microsoft Windows Web Proxy Autodiscovery Protocol (WPAD) DNS Subversion
3827| [34102] Microsoft Windows Vista Mail Client Crafted Link Arbitrary Program Execution
3828| [34101] Microsoft Windows XP winmm.dll mmioRead Function DoS
3829| [34100] Microsoft Windows DNS RPC Interface Zone Name Remote Overflow
3830| [34099] Microsoft Windows TrueType Fonts Rasterizer Local Privilege Escalation
3831| [34098] Microsoft Windows GDI Functions Windows Metafile (WMF) Handling DoS
3832| [34097] Microsoft Windows GDI Enhanced Metafile (EMF) Handling Local Privilege Escalation
3833| [34096] Microsoft Windows GDI Invalid Window Size Local Privilege Escalation
3834| [34095] Microsoft Windows GDI Crafted Image Local Privilege Escalation
3835| [34077] Microsoft IE navcancl.htm res: URI XSS
3836| [34039] Adobe JRun IIS 6 Connector Unspecified File Request DoS
3837| [34011] Microsoft Windows Kernel Mapped Memory Local Privilege Escalation
3838| [34010] Microsoft Windows XP UPnP Remote Memory Corruption
3839| [34009] Microsoft Windows Agent URL Parsing Memory Corruption
3840| [34008] Microsoft Windows Vista CSRSS Local Privilege Escalation
3841| [34007] Microsoft Content Management Server (CMS) Unspecified XSS
3842| [34006] Microsoft Content Management Server (CMS) Crafted HTTP Request Memory Corruption
3843| [33668] Microsoft Windows Vista Meeting Space DFSR.exe TCP Connection Persistence
3844| [33667] Microsoft Windows Vista Persistent Established Teredo Address
3845| [33666] Microsoft Windows Vista Teredo nonce Spoofing
3846| [33665] Microsoft Windows Vista Neighbor Discovery Crafted Neighbor Advertisement Redirect
3847| [33664] Microsoft Windows Vista Crafted Gratuitous ARP Overwrite DoS
3848| [33663] Microsoft Windows Vista LLTD Mapper HELLO Packet Spoofing
3849| [33662] Microsoft Windows Vista LLTD Mapper Real Source Field Host Spoofing
3850| [33661] Microsoft Windows Vista LLTD Responder Race Condition Host Spoofing
3851| [33660] Microsoft Windows Vista LLTD Mapper EMIT Packet Gathering Remote DoS
3852| [33639] Microsoft Class Package Export Tool (clspack.exe) Long String Overflow
3853| [33638] Microsoft ISA Server IPv6 Filter Rule Bypass
3854| [33635] AMD ATI Radeon for Microsoft Windows Vista atikmdag.sys Kernel Mode Driver DoS
3855| [33629] Microsoft IE Animated Cursor (.ani) Handling Arbitrary Command Execution
3856| [33628] Microsoft Windows NDISTAPI.sys Permission Weakness Local DoS
3857| [33627] Microsoft Vista Speech Recognition Web Page Arbitrary Command Execution
3858| [33626] Microsoft Visual C++ MSVCR80.DLL Time Functions Assertion Error
3859| [33474] Microsoft Windows ReadDirectoryChangesW API Function File System Information Disclosure
3860| [33307] Microsoft Windows Media MID Malformed Header Chunk DoS
3861| [33306] Microsoft Windows Explorer explorer.exe WMV File Handling DoS
3862| [33271] Microsoft Word Crafted Frame CSRF
3863| [33270] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution
3864| [33219] Microsoft Windows Live Messenger Gestual Emoticon Saturation CPU Consumption DoS
3865| [33196] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (934232)
3866| [32630] Microsoft IE Key Press Event Focus Redirection
3867| [32629] Microsoft IE on Windows Mobile Malformed WML Page Unspecified DoS
3868| [32628] Microsoft Windows / IE ActiveX (mshtml.dll) Multiple Property NULL Pointer DoS
3869| [32627] Microsoft IE msxml3 Module Nested Tag Race Condition DoS
3870| [32626] Microsoft IE Crafted res:// Forced 404 Page Reporting
3871| [32625] Microsoft IE res://ieframe.dll/invalidcert.htm Site Security Certificate Discrediting
3872| [32624] Microsoft IE mhtml Overflow DoS
3873| [32445] Microsoft Windows Workstation Service NetrWkstaUserEnum RPC Request DoS
3874| [32123] ColdFusion / JRun on IIS Double Encoded NULL Byte Request File Content Disclosure
3875| [32119] Microsoft IE Cross Domain Charset Inheritance Weakness
3876| [32087] Microsoft IE onunload Event Address Bar Spoofing
3877| [31901] Microsoft Office Unspecified String Handling Arbitrary Code Execution
3878| [31900] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (929434)
3879| [31899] Microsoft Help Workshop HPJ File OPTIONS Section Overflow
3880| [31898] Microsoft Help Workshop Crafted .cnt File Handling Overflow
3881| [31897] Microsoft Windows CSRSS NtRaiseHardError Function Arbitrary Memory Disclosure
3882| [31896] Microsoft Project Server pdsrequest.asp GetInitializationData Request SQL Database Password Disclosure
3883| [31895] Microsoft IE Blnmgrps.dll COM Object Instantiation Memory Corruption
3884| [31894] Microsoft IE Htmlmm.ocx COM Object Instantiation Memory Corruption
3885| [31893] Microsoft IE Msb1fren.dll COM Object Instantiation Memory Corruption
3886| [31892] Microsoft IE FTP Server Response Parsing Memory Corruption
3887| [31891] Microsoft IE Imjpcksid.dll COM Object Instantiation Memory Corruption
3888| [31890] Microsoft Windows Shell New Hardware Local Privilege Escalation
3889| [31889] Microsoft Windows XP SP2 Image Aquisition Service Local Privilege Escalation
3890| [31888] Microsoft Malware Protection Engine PDF File Parsing Remote Code Execution
3891| [31887] Microsoft MFC Component RTF OLE Object Memory Corruption Remote Code Execution
3892| [31886] Microsoft RichEdit OLE Dialog RTF Memory Corruption Remote Code Execution
3893| [31885] Microsoft Windows OLE Dialog Memory Corruption Remote Code Execution
3894| [31884] Microsoft Windows HTML Help ActiveX Control Arbitrary Code Execution
3895| [31883] Microsoft Step-by-Step Interactive Training Bookmark Handling Remote Code Execution
3896| [31882] Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Execution
3897| [31805] XEROX WorkCentre Products Web User Interface Microsoft Networking Configuration Command Injection
3898| [31659] Microsoft Windows CSRSS MessageBox Function Privilege Escalation
3899| [31647] Microsoft IE Javascript IsComponentInstalled Overflow
3900| [31645] Microsoft Windows DNS Recursive Query DoS
3901| [31333] Microsoft IE Image File Embedded Content XSS
3902| [31332] Microsoft IE Scrollbar CSS Property DoS
3903| [31331] Microsoft IE mailto: Handler Arbitrary Command-Line Argument Modification
3904| [31330] Microsoft IE File:// URI src Tag IFrame DoS
3905| [31329] Microsoft IE DNS Pinning Intranet Server Arbitrary Javascript Execution
3906| [31328] Microsoft IE UTF-7 Encoded HTTP 404 Error Message XSS
3907| [31326] Microsoft IE HTML Table Tag style Attribute DoS
3908| [31325] Microsoft IE HTML Frame Tag Invalid src Attribute DoS
3909| [31324] Microsoft IE DirectAnimation ActiveX Multiple Unspecified
3910| [31323] Microsoft IE DIV Tag and HTML CSS Float Properties Arbitrary Code Execution
3911| [31322] Microsoft IE SSL Certificate Chain Validation MiTM Weakness
3912| [31321] Microsoft IE Javascript self.location Refresh DoS
3913| [31258] Microsoft Excel Palette Record Handling Overflow
3914| [31257] Microsoft Excel Column Record Heap Corruption Remote Code Execution
3915| [31256] Microsoft Excel Malformed String Handling Remote Code Execution
3916| [31255] Microsoft Excel IMDATA Record Handling Remote Code Execution
3917| [31254] Microsoft Outlook Advanced Find .oss File Handling Remote Code Execution
3918| [31253] Microsoft Outlook E-mail Header Processing Unspecified DoS
3919| [31252] Microsoft Outlook VEVENT Record Handling Remote Code Execution
3920| [31251] Microsoft Office 2003 Brazilian Portuguese Grammar Checker Arbitrary Code Execution
3921| [31250] Microsoft IE Vector Markup Language (VML) Remote Overflow
3922| [31249] Microsoft Excel Malformed Record Memory Access Code Execution
3923| [30997] Microsoft Windows .manifest File Handling Local DoS
3924| [30871] Microsoft Windows DRM drmstor.dll ActiveX Object StoreLicense Function Memory Corruption
3925| [30834] Microsoft IE URLMON.DLL Long URL HTTP Redirect Overflow
3926| [30826] Microsoft Visual Basic Click Event Procedure Overflow
3927| [30825] Microsoft Word Malformed Data Structure Handling Memory Corruption
3928| [30824] Microsoft Word Malformed String Memory Corruption
3929| [30823] Microsoft Windows Print Spooler (spoolsv.exe) RpcGetPrinterData Function DoS
3930| [30822] Microsoft IE A Tag Long Title Attribute DoS
3931| [30821] Microsoft Outlook Express Windows Address Book Contact Record Code Execution
3932| [30820] Microsoft Word mso.dll / mso9.dll LsCreateLine Function DoS
3933| [30819] Microsoft Windows Media Player ASX Playlist Handling Overflow
3934| [30818] Microsoft Windows Media Player ASF Parsing Overflow
3935| [30817] Microsoft Windows Remote Installation Service TFTP Arbitrary File Overwrite
3936| [30816] Microsoft IE TIF Folder Cached Content Information Disclosure
3937| [30815] Microsoft IE TIF Folder Drag and Drop Operation Information Disclosure
3938| [30814] Microsoft IE DHTML Script Function Memory Corruption
3939| [30813] Microsoft IE Script Error Handling Memory Corruption
3940| [30811] Microsoft Windows SNMP Service Remote Overflow
3941| [30405] Microsoft Windows Active Directory Unspecified DoS
3942| [30402] Microsoft w3wp Crafted COM Component Request DoS
3943| [30263] Microsoft Windows Workstation Service Crafted Message Remote Overflow
3944| [30262] Microsoft Windows Agent ACF File Handling Memory Corruption
3945| [30261] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote DoS
3946| [30260] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote Code Execution
3947| [30214] Microsoft Windows GDI Kernel Structure Modification Code Execution
3948| [30208] Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Execution
3949| [30155] Microsoft Visual Studio WMI Object Broker ActiveX (WmiScriptUtils.dll) Unspecified Code Execution
3950| [30096] Microsoft Windows NAT Helper Components ipnathlp.dll with ICS Malformed DNS Query DoS
3951| [30087] Microsoft IE Empty APPLET Tag DoS
3952| [30022] Microsoft IE Non-breaking Spaces Popup Address Bar Spoofing
3953| [29724] Microsoft Hyperlink Object Library (hlink.dll) Crafted Hyperlink Arbitrary Code Execution
3954| [29720] Microsoft PowerPoint Unspecified Code Execution
3955| [29529] Microsoft Windows 2000 creator.dll ActiveX COM Object Memory Corruption
3956| [29528] Microsoft Windows 2000 msdxm.ocx ActiveX COM Object Memory Corruption
3957| [29527] Microsoft Windows 2000 myinfo.dll ActiveX COM Object Memory Corruption
3958| [29526] Microsoft Windows 2000 ciodm.dll ActiveX COM Object Memory Corruption
3959| [29525] Microsoft IE dxtmsft3.dll Multiple ActiveX COM Object DoS
3960| [29524] Microsoft IE dxtmsft.dll Multiple ActiveX COM Object DoS
3961| [29501] Microsoft Visual Studio Multiple ActiveX COM Object Remote Memory Corruption
3962| [29448] Microsoft PowerPoint Crafted File Unspecified Code Execution
3963| [29447] Microsoft PowerPoint Crafted PPT Data Record Code Execution
3964| [29446] Microsoft PowerPoint Crafted PPT Object Pointer Code Execution
3965| [29445] Microsoft Excel Crafted XLS COLINFO Record Arbitrary Code Execution
3966| [29443] Microsoft Excel Crafted XLS DATETIME Record Arbitrary Code Execution
3967| [29442] Microsoft Word for Mac Crafted String Unspecified Code Execution
3968| [29441] Microsoft Word Crafted Mail Merge File Arbitrary Code Execution
3969| [29440] Microsoft Word memmove Integer Overflow
3970| [29439] Microsoft Windows Server Service Crafted SMB Packet Unspecified Issue
3971| [29431] Microsoft .NET Framework AutoPostBack Property Unspecified XSS
3972| [29430] Microsoft Office Malformed Smart Tag Arbitrary Code Execution
3973| [29429] Microsoft Office mso.dll Malformed Record Handling Arbitrary Code Execution
3974| [29428] Microsoft Office Malformed Chart Record Unspecified Arbitrary Code Execution
3975| [29427] Microsoft Office Crafted String Unspecified Arbitrary Code Execution
3976| [29426] Microsoft XML Core Services XSLT Processing Overflow
3977| [29425] Microsoft XML Core Services XMLHTTP ActiveX Control Server-side Redirect Information Disclosure
3978| [29424] Microsoft Windows Object Packager File Extension Dialog Spoofing
3979| [29412] Microsoft Terminal Server Explorer Error Arbitrary Code Execution
3980| [29351] Microsoft Windows Terminal Services tsuserex.dll COM Object Instantiation
3981| [29347] Microsoft IE msoe.dll COM Object Instantiation Code Execution
3982| [29346] Microsoft IE chtskdic.dll COM Object Instantiation Code Execution
3983| [29345] Microsoft IE imskdic.dll COM Object Instantiation Code Execution
3984| [29259] Microsoft PowerPoint PPT Unspecified Arbitrary Code Execution
3985| [29231] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Arbitrary Code Execution
3986| [29143] Microsoft PowerPoint PPT Malformed BIFF File Arbitrary Command Execution
3987| [29129] Microsoft IE wininet.dll Content-Type DoS
3988| [29128] Microsoft Windows gdiplus.dll Divide-by-zero DoS
3989| [28946] Microsoft IE Vector Markup Language (VML) Arbitrary Code Execution
3990| [28842] Microsoft IE daxctle.ocx KeyFrame() Method Overflow
3991| [28841] Microsoft IE daxctle.ocx Spline Function Call Overflow
3992| [28731] Microsoft Windows Pragmatic General Multicast (PGM) Multicast Message Arbitrary Code Execution
3993| [28730] Microsoft Publisher PUB File Font Parsing Overflow
3994| [28729] Microsoft Windows Indexing Service Unspecified XSS
3995| [28725] Microsoft Works Malformed Excel Spreadsheet DoS
3996| [28724] Microsoft Works Malformed Excel Spreadsheet Overflow
3997| [28723] Microsoft Works Malformed Works Spreadsheet DoS
3998| [28627] Microsoft IE VBScript and Javascript Infinite Loop Stack Overflow
3999| [28614] Microsoft IE input/div Tag width Conflict DoS
4000| [28539] Microsoft Word 2000 Unspecified Code Execution
4001| [28538] Microsoft Excel Cell Comment Rebuild Arbitrary Code Execution
4002| [28537] Microsoft Excel Crafted SELECTION Record Arbitrary Code Execution
4003| [28536] Microsoft Excel SELECTION Record Memory Corruption Arbitrary Code Execution
4004| [28535] Microsoft Excel Crafted COLINFO Record Arbitrary Code Execution
4005| [28534] Microsoft Excel Crafted LABEL Record Arbitrary Code Execution
4006| [28533] Microsoft Excel Crafted FNGROUPCOUNT Value Arbitrary Code Execution
4007| [28532] Microsoft Excel Crafted BIFF Record Array Index Arbitrary Code Execution
4008| [28381] Microsoft IE ActiveX SaveFile Handling DoS
4009| [28376] Microsoft IE US-ASCII Character Set Filter Bypass XSS
4010| [28372] Microsoft Windows Explorer URL Passing Recursive file Tag Local DoS
4011| [28208] Microsoft Windows Live Messenger Contact List .ctt File Heap Overflow
4012| [27922] Microsoft Virtual DOS Machine (VDM) Local Memory Disclosure
4013| [27855] Microsoft IE document.getElementByID Crafted CSS Arbitrary Code Execution
4014| [27854] Microsoft IE Chained CSS Imports Memory Corruption
4015| [27853] Microsoft IE HTML Rendering Memory Corruption
4016| [27852] Microsoft IE Uninitialized COM Object Memory Corruption
4017| [27851] Microsoft IE Redirect Handling Cross-Domain Privilege Escalation
4018| [27850] Microsoft IE Cross Site Window Location Information Disclosure
4019| [27849] Microsoft Visual Basic Unspecified Document Handling Overflow
4020| [27848] Microsoft Windows Kernel Unspecified Local Privilege Escalation
4021| [27847] Microsoft Windows Unhandled Exception Unspecified Remote Code Execution
4022| [27846] Microsoft Windows Winlogon Search Path Subversion Local Privilege Escalation
4023| [27845] Microsoft Windows Server Service Crafted RPC Message Remote Overflow
4024| [27844] Microsoft Windows DNS Client Service Record Response Overflow
4025| [27843] Microsoft Windows Winsock API Hostname Remote Code Execution
4026| [27842] Microsoft Management Console (MMC) HTML-embedded Resource XSS Arbitrary Command Execution
4027| [27797] Microsoft Windows GDI library (gdi32.dll) createBrushIndirect Function WMF Parsing DoS
4028| [27644] Microsoft Windows Server Driver (srv.sys) Crafted SMB Packet NULL Dereference DoS
4029| [27533] Microsoft IE Orphan Object Property Access NULL Dereference
4030| [27532] Microsoft IE ADODB.Recordset SysFreeString Invalid Length
4031| [27530] Microsoft IE NDFXArtEffects Multiple Property Overflow
4032| [27507] Microsoft Excel Embedded Shockwave Flash Object Arbitrary Javascript Execution
4033| [27475] Microsoft IE Nested Objects Exception Handler Unspecified Memory Corruption
4034| [27373] Microsoft IE Native Function Iteration NULL Dereference
4035| [27372] Microsoft IE Forms Multiple Object ListWidth Property Overflow
4036| [27327] Microsoft PowerPoint PPT File Closure Memory Corruption
4037| [27326] Microsoft PowerPoint powerpnt.exe Unspecified Issue
4038| [27325] Microsoft PowerPoint mso.dll PPT Processing Unspecified Code Execution
4039| [27324] Microsoft PowerPoint mso.dll PPT Processing Arbitrary Code Execution
4040| [27232] Microsoft IE NMSA.ASFSourceMediaDescription dispValue Overflow
4041| [27231] Microsoft IE HTML Help COM Object Click Method NULL Dereference
4042| [27230] Microsoft IE CEnroll SysAllocStringLen Invalid Length
4043| [27155] Microsoft Windows Server Service SRV.SYS Crafted Request SMB Information Disclosure
4044| [27154] Microsoft Windows Server Service SRV.SYS First-class Mailslot Message Remote Overflow
4045| [27153] Microsoft .NET Framework Crafted Request Access Restriction Bypass
4046| [27151] Microsoft Windows DHCP Client Service Crafted Response Overflow
4047| [27150] Microsoft Office MSO.DLL String Processing Overflow
4048| [27149] Microsoft Office Malformed Property Overflow Arbitrary Code Execution
4049| [27148] Microsoft Office File Processing Malformed String Arbitrary Code Execution
4050| [27147] Microsoft Office PNG Processing Unspecified Code Execution
4051| [27146] Microsoft Office GIFIMP32.FLT GIF Parsing Overflow
4052| [27112] Microsoft IE OVCtl NewDefaultItem Method NULL Dereference
4053| [27111] Microsoft IE OWC11.DataSourceControl getDataMemberName Method Overflow
4054| [27110] Microsoft IE WebViewFolderIcon setSlice Overflow
4055| [27109] Microsoft IE DXImageTransform.Microsoft.Gradient Multiple Property Overflow
4056| [27108] Microsoft IE MHTMLFile Multiple Property NULL Dereference
4057| [27059] Microsoft IE FolderItem Object NULL Dereference
4058| [27057] Microsoft IE DXImageTransform.Microsoft.RevealTrans Transition Property NULL Dereference
4059| [27056] Microsoft IE TriEditDocument URL Property NULL Dereference
4060| [27055] Microsoft IE HtmlDlgSafeHelper fonts Property NULL Dereference
4061| [27053] Microsoft Excel Asian Language Style Option Overflow
4062| [27014] Microsoft IE Object.Microsoft.DXTFilter Enabled Property NULL Dereference
4063| [27013] Microsoft IE DirectAnimation.DAUserData Data Property NULL Dereference
4064| [26957] Microsoft IE File Share Traversal Arbitrary HTA Execution
4065| [26956] Microsoft IE object.documentElement.outerHTML Cross-site Information Disclosure
4066| [26955] Microsoft IE RDS.DataControl SysAllocStringLen Invalid Length Issue
4067| [26839] Microsoft IE DirectAnimation.StructuredGraphicsControl SourceURL NULL Dereference
4068| [26837] Microsoft IE Frameset inside Table NULL Dereference
4069| [26836] Microsoft IE OutlookExpress.AddressBook COM Object NULL Dereference
4070| [26835] Microsoft IE HTML Help COM Object Image Property Heap Overflow
4071| [26834] Microsoft IE ADODB.Recordset COM Object Filter Property NULL Dereference
4072| [26666] Microsoft Hyperlink Object Library hlink.dll Link Processing Overflow
4073| [26527] Microsoft Excel Malformed URL String Handling Overflow
4074| [26446] Microsoft IE Multipart HTML File Save Memory Corruption
4075| [26445] Microsoft IE Modal Browser Window Address Bar Spoofing
4076| [26444] Microsoft IE DXImageTransform.Microsoft.Light ActiveX Arbitrary Code Execution
4077| [26443] Microsoft IE UTF-8 Encoded HTML Overflow
4078| [26442] Microsoft IE Wmm2fxa.dll DXImageTransform COM Object Memory Corruption
4079| [26441] Microsoft Exchange Server Outlook Web Access HTML Parsing Unspecified XSS
4080| [26440] Microsoft Windows SMB MrxSmbCscIoctlOpenForCopyChunk Function Overflow
4081| [26439] Microsoft Windows SMB MRXSMB.SYS MrxSmbCscIoctlCloseForCopyChunk Remote DoS
4082| [26438] Microsoft Windows RPC Mutual Authentication Server Spoofing
4083| [26437] Microsoft Windows RRAS RASMAN Remote Overflow
4084| [26436] Microsoft Windows RASMAN RPC Request Remote Overflow
4085| [26435] Microsoft PowerPoint Malformed Record Arbitrary Code Execution
4086| [26434] Microsoft JScript Object Release Memory Corruption
4087| [26433] Microsoft Windows TCP/IP Protocol Driver Source Routing Overflow
4088| [26432] Microsoft Windows jgdw400.dll ART Image Rendering Overflow
4089| [26431] Microsoft Windows Graphics Rendering Engine PolyPolygon Function Overflow
4090| [26430] Microsoft Windows Media Player PNG Processing Overflow
4091| [26193] Microsoft NetMeeting Unspecified Remote DoS
4092| [26175] Microsoft Jet SQL Command Overflow NULL Dereference DoS
4093| [25949] Microsoft Windows INETCOMM.DLL mhtml: URI Overflow
4094| [25761] Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
4095| [25635] Microsoft Word Unspecified Code Execution
4096| [25501] Microsoft Windows itss.dll CHM Processing Overflow
4097| [25338] Microsoft Exchange Collaboration Data Objects Crafted Email Code Execution
4098| [25336] Microsoft Windows Distributed Transaction Coordinator (DTC) BuildContextW Request DoS
4099| [25335] Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServer::BuildContext Function Remote Overflow
4100| [25073] Microsoft IE mhtml: Redirection Domain Restriction Bypass
4101| [25003] Microsoft Office mailto: Arbitrary File Access
4102| [24966] Microsoft IE object Tag Memory Corruption Arbitrary Code Execution
4103| [24802] Microsoft Windows Help winhlp32.exe Embedded Image Processing Overflow
4104| [24595] Microsoft Office Malformed BIFF Record Multiple File Format Processing DoS
4105| [24547] Microsoft IE HTML Parsing Unspecified Remote Code Execution
4106| [24546] Microsoft IE COM Object Instantiation Remote Code Execution
4107| [24545] Microsoft IE HTML Element Crafted Tag Arbitrary Code Execution
4108| [24544] Microsoft IE IOleClientSite Dynamic Object Script Execution
4109| [24543] Microsoft IE Navigation Method Cross-Domain Information Disclosure
4110| [24542] Microsoft IE Unspecified Address Bar Spoofing
4111| [24541] Microsoft IE Double Byte Character Set (DBCS) Parsing Overflow
4112| [24519] Microsoft Outlook Express Windows Address Book (.wab) Processing Overflow
4113| [24518] Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
4114| [24517] Microsoft Data Access Components RDS.Dataspace ActiveX Remote Code Execution
4115| [24516] Microsoft Windows Explorer COM Object Handling Remote Code Execution
4116| [24490] Microsoft IE w/ Sun Java VM INPUT Focus DoS
4117| [24465] Microsoft IE Window Loading Race Condition Address Bar Spoofing
4118| [24318] Microsoft Fingerprint Reader Cleartext Credential Transmission
4119| [24208] Microsoft .NET Framework ILDASM Overflow
4120| [24207] Microsoft .NET Framework ILASM .il File Processing Overflow
4121| [24121] Microsoft Commerce Server 2002 authfiles/login.asp Authentication Bypass
4122| [24095] Microsoft IE Arbitrary HTA File Execution
4123| [24081] Microsoft Outlook 2003 Unspecified Malformed Word Attachment DoS
4124| [24050] Microsoft IE createTextRange() Function Arbitrary Code Execution
4125| [23964] Microsoft IE mshtml.dll Multiple Script Action Handler Overflow
4126| [23903] Microsoft Office Crafted Routing Slip Arbitrary Code Execution
4127| [23902] Microsoft Office Excel Malformed Record Arbitrary Code Execution
4128| [23901] Microsoft Office Excel Malformed Graphic Arbitrary Code Execution
4129| [23900] Microsoft Office Excel Malformed Description Arbitrary Code Execution
4130| [23899] Microsoft Office Excel BIFF File Processing Malformed BOOLERR Record Arbitrary Code Execution
4131| [23711] Microsoft Visual Studio .dbp File DataProject Field Buffer Overflow
4132| [23657] Microsoft IE ActiveX Killbit Setting Bypass
4133| [23609] Microsoft IE Crafted Elements Status Bar URL Spoofing
4134| [23608] Microsoft IE Iframe Folder Delete Weakness
4135| [23591] Microsoft Office Spreadsheet Component SaveAs Capability Arbitrary File Creation
4136| [23588] Microsoft IE Self-referenced OBJECT Directive DoS
4137| [23490] Microsoft IE Scripting Engine Thread Stack Exhaustion DoS
4138| [23484] Microsoft SQLServer 2000 sp_addalias Procedure Privileged Alias Creation
4139| [23307] Microsoft IE window.status Memory Leak DoS
4140| [23234] Microsoft SQLServer 2000 Unspecified Invalid Client Buffer DoS
4141| [23231] Microsoft SQL Server 2000 SQL Profiler Multiple Method DoS
4142| [23228] Microsoft Outlook Web Access .INC File Direct Request Source Disclosure
4143| [23205] Microsoft SQLServer 2000 Crafted Sort Command User Mode Scheduler (UMS) Bypass DoS
4144| [23203] Microsoft SQL Server 2000 Database Name Transact-SQL Statement Privilege Escalation
4145| [23202] Microsoft SQLServer 2000 sysmembers Virtual Table Query Overflow
4146| [23201] Microsoft SQL Server 2000 Dynamic Transact-SQL Statement Disclosure
4147| [23200] Microsoft SQLServer 2000 Encrypted Stored Procedure Dynamic Query Disclosure
4148| [23136] Microsoft Windows/Office Korean Input Method Editor (IME) ShellAbout() Privilege Escalation
4149| [23135] Microsoft PowerPoint Temporary Internet Files Information Disclosure
4150| [23134] Microsoft Windows Web Client Service Crafted WebDAV Request Overflow
4151| [23133] Microsoft Windows IGMPv3 Crafted Packet Remote DoS
4152| [23132] Microsoft Windows Media Player Plug-in Malformed EMBED Element Arbitrary Code Execution
4153| [23131] Microsoft Windows Media Player Bitmap File Processing Overflow
4154| [23047] Microsoft Windows SSDP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4155| [23046] Microsoft Windows SCardSvr SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4156| [23045] Microsoft Windows NetBT SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4157| [23044] Microsoft Windows UPnP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
4158| [22977] Microsoft IE jscript.dll document.write() NULL Pointer DoS
4159| [22976] Microsoft IE Crafted WMF Header Size Arbitrary Code Execution
4160| [22948] Microsoft IE urlmon.dll BGSOUND Tag file Attribute Overflow DoS
4161| [22941] Microsoft HTML Help Workshop .hhp Parsing Overflow
4162| [22834] Microsoft Log Sink Class pkmcore.dll ActiveX Arbitrary File Manipulation
4163| [22824] Microsoft Excel xls Processing Malformed Page Size Name Null Dereference
4164| [22823] Microsoft Excel xls Processing Malformed Graphic Pointer NULL Pointer Dereference
4165| [22710] Microsoft Windows Ad-hoc Network Advertisement Weakness
4166| [22697] Microsoft Windows Unspecified Display Driver Large Image Processing DoS
4167| [22396] Microsoft Windows WMF Processing ExtEscape POSTSCRIPT_INJECTION Function Overflow DoS
4168| [22371] Microsoft Windows WMF Processing ExtCreateRegion Function Overflow DoS
4169| [22356] Microsoft IE Unspecified NULL Dereference DoS (#2)
4170| [22355] Microsoft IE Unspecified NULL Dereference DoS (#1)
4171| [22354] Microsoft IE Malformed table datasrc Tag DoS
4172| [22351] Microsoft IE Modal Security Dialog Race Condition
4173| [22332] Microsoft Visual Studio UserControl Load Event Code Execution
4174| [22305] Microsoft Outlook/Exchange TNEF Decoding Arbitrary Code Execution
4175| [21987] Microsoft Windows Shimgvw.dll SETABORTPROC Function Crafted WMF Arbitrary Code Execution
4176| [21907] Microsoft Office InfoPath 2003 Mshtml.dll Form Handling DoS
4177| [21763] Microsoft IE Embedded CLSID COM Object Arbitrary Code Execution
4178| [21762] Microsoft IE HTTPS Proxy Basic Authentication URL Cleartext Transmission
4179| [21761] Microsoft IE Keyboard Shortcut Processing Weakness
4180| [21760] Microsoft IE Suppressed Download Dialog Window Manipulation Weakness
4181| [21598] Microsoft Windows 2000 NetBIOS Port Malformed TCP Packet Parsing Remote DoS
4182| [21568] Microsoft Excel xls Processing msvcrt.memmove() Function Malformed Range Overflow
4183| [21562] Microsoft IE CSS Crafted p Element DoS
4184| [21536] Microsoft Windows backup File Name Extension Overflow
4185| [21532] Microsoft IE CSS @import Directive Cross Domain Information Disclosure
4186| [21510] Microsoft Windows SynAttackProtect Bypass
4187| [21471] IISWorks ASPKnowledgeBase kb.asp a Parameter XSS
4188| [20916] Microsoft Windows UPnP GetDeviceList Remote DoS
4189| [20886] Microsoft IE Unspecified Margin/Padding NULL Pointer Dereference DoS
4190| [20875] Microsoft Windows XP Professional Upgrade MSIE Rollback
4191| [20874] Microsoft IE clipboardData Object getData Method Content Disclosure
4192| [20580] Microsoft Windows GetEnhMetaFilePaletteEntries() EMF File Rendering DoS
4193| [20579] Microsoft Windows GDI Metafile SetPalette Entries Overflow
4194| [20500] Microsoft IE Restricted Zone Site Addition URI DoS
4195| [20497] Microsoft Windows 98SE User32.dll Icon DoS
4196| [20376] Microsoft IE with JRE mshtmled.dll Malformed frameset Tag DoS
4197| [20367] Microsoft Windows XP Fast User Switching Arbitrary Account Lockout
4198| [20366] Microsoft Windows XP Remote Desktop Client Cleartext Account Name Transmission
4199| [20364] Microsoft Windows keybd_event Validation Privilege Escalation
4200| [20356] Microsoft Windows Win32k.sys ShowWindow Function Local DoS
4201| [20279] Microsoft Windows ME ssdpsrv.exe Crafted SSDP Message DoS
4202| [20271] Microsoft IE settimeout Function Recursion DoS
4203| [20256] Microsoft Windows 2000 NTFS Volume Macintosh Client Directory Permission Modification
4204| [20248] Microsoft IE Embedded Content Processing XSS
4205| [20241] Microsoft ISA Server Fragmented UDP Saturation DoS
4206| [20222] Microsoft Windows 2000 runas.exe Named Pipe Spoofing Information Disclosure
4207| [20221] Microsoft Windows 2000 runas.exe Named Pipe Single Thread DoS
4208| [20220] Microsoft Windows 2000 runas.exe Cleartext Authentication Information Disclosure
4209| [20217] Macromedia JRun on JWS/IIS Crafted Filename Request Arbitrary JSP Source Disclosure
4210| [20207] Microsoft IE Alphanumeric Password Character Recognition Issue
4211| [20199] Microsoft IE Image Saturation Handling DoS
4212| [20188] Microsoft Windows Crafted SMB SMBnegprots Request DOS
4213| [20151] RSA Authentication Agent for Web IISWebAgentIF.dll Redirect Overflow
4214| [20148] Microsoft Windows smbmount Directory Manipulation Saturation DoS
4215| [20146] Microsoft IE PerfectNav Plugin Malformed URL DoS
4216| [20028] Microsoft Windows XP SP2 TFTP Local Overflow
4217| [20002] Microsoft Windows 2000 CHKDSK Fix Mode File ACL Failure
4218| [20001] Microsoft Windows 2000 Terminal Service Client Connection IP Logging Failure
4219| [20000] Microsoft Windows 2000 Domain Administrator Computer Lock Bypass
4220| [19999] Microsoft Windows 2000 FQDN Domain Login Password Expiry Bypass
4221| [19998] Microsoft Windows 2000 UPN Credentialed Login Group Policy Failure
4222| [19997] Microsoft Windows 2000 WideCharToMultiByte Function String Termination Issue
4223| [19995] Microsoft Windows 2000 SECEDIT Long Folder ACL Set Issue
4224| [19994] Microsoft Windows 2000 audit directory service access 565 Event Logging Failure
4225| [19993] Microsoft Windows 2000 LDAPS CA Trust Issue
4226| [19922] Microsoft Windows Client Service for NetWare (CSNW) Remote Overflow
4227| [19905] Microsoft Collaboration Data Objects Remote Overflow
4228| [19904] Microsoft Windows DTC Packet Relay DoS
4229| [19903] Microsoft Windows DTC Transaction Internet Protocol (TIP) DoS
4230| [19902] Microsoft Windows COM+ Remote Code Execution
4231| [19901] Microsoft Windows FTP Client Arbitrary File Write
4232| [19900] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2122)
4233| [19899] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2118)
4234| [19898] Microsoft Windows Web View Arbitrary Script Injection
4235| [19876] Microsoft AntiSpyware Registry Extension Bypass
4236| [19873] Microsoft Windows XP Wireless Zero Configuration Credential/Key Disclosure
4237| [19857] Microsoft Windows SeDebugPrivilege NtSystemDebugControl Function Privilege Escalation
4238| [19806] Microsoft IE Crafted Double Backslash shell: URI DoS
4239| [19798] Microsoft IE for Mac Malformed BGSOUND Tag DoS
4240| [19796] Microsoft IE Malformed IFRAME File Source DoS
4241| [19775] Microsoft Windows XP ISAKMP UDP Saturation DoS
4242| [19764] Microsoft Windows XP Malformed explorer.exe.manifest Local DoS
4243| [19662] Microsoft IE XMLHTTP HTTP Request Injection
4244| [19287] Microsoft Windows Firewall Malformed Registry Entry Ruleset Exception Weakness
4245| [19264] Microsoft Exchange Server 2003 Crafted IMAP4 Folder Listing Request DoS
4246| [19187] Microsoft Windows NT/2000 DNS Server Non-delegated NS Glue Record Cache Poisoning
4247| [19185] Microsoft Windows XP Internet Connection Firewall sessmgr.exe Accss Control Bypass
4248| [19093] Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution
4249| [19089] Microsoft IE Unspecified Remote Code Execution
4250| [19029] Microsoft IE Meta Refresh Parsing Weakness
4251| [19024] Microsoft IE Automatic MIME Detection Weakness
4252| [19007] Microsoft Windows 95 smbclient Triple Dot Traversal Arbitrary Command Execution
4253| [19006] Microsoft Windows NT snmp.exe Malformed OID Packet Saturation DoS
4254| [18956] Microsoft Windows Registry Editor (Regedt32.exe) Long String Obfuscation
4255| [18830] Microsoft Windows UMPNPMGR wsprintfW Remote Overflow
4256| [18829] Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
4257| [18828] Microsoft Windows Distributed Transaction Coordinator (DTC) Memory Modification Remote Code Execution
4258| [18824] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050627)
4259| [18823] Microsoft Windows Kernel APC Queue Manipulation Local Privilege Escalation
4260| [18822] Microsoft DirectX DirectShow QUARTZ.DLL AVI Processing Overflow
4261| [18821] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050505)
4262| [18820] Microsoft Windows GDI EMF/WMF Metafile Processing Multiple Overflows
4263| [18730] Microsoft Windows XP SP1 Raw IP Empty Datagram DoS
4264| [18729] Microsoft Windows SNMP LAN Manager (LANMAN) MIB Extension GET/NEXT Request DoS
4265| [18728] Microsoft Windows QueryIpMatching Weakness DNS Cache Poisoning
4266| [18681] Microsoft Windows XP User Account Manager Hidden User
4267| [18624] Microsoft Windows Remote Desktop Protocol (RDP) Crafted Packet Remote DoS
4268| [18612] Microsoft IE Multiple COM Object Embedded CLSID Arbitrary Remote Code Execution
4269| [18611] Microsoft IE Web Folder Cross-Domain Code Execution
4270| [18610] Microsoft IE JPEG Rendering Memory Corruption Arbitrary Code Execution
4271| [18609] Microsoft Windows Kerberos PKINIT Domain Controller Spoofing
4272| [18608] Microsoft Windows Kerberos Crafted Packet Remote DoS
4273| [18607] Microsoft Windows Print Spooler Service Remote Overflow
4274| [18606] Microsoft Windows Telephony Application Programming Interface (TAPI) Overflow
4275| [18605] Microsoft Windows Plug-and-Play Service Remote Overflow
4276| [18545] Microsoft Windows NT Cenroll ActiveX (xenroll.dll) File Creation Saturation DoS
4277| [18510] Microsoft IE AJAX Crafted Content-type Header DoS
4278| [18493] Microsoft Windows USB Device Driver Overflow
4279| [18484] Mozilla Firefox with Microsoft Office Shared Section Permission Weakness Information Disclosure
4280| [18461] Microsoft ActiveSync Client/Server Partnership ID Spoofing
4281| [18460] Microsoft ActiveSync Authentication Transmission Cleartext Disclosure
4282| [18459] Microsoft ActiveSync Sync Request Saturation DoS
4283| [18458] Microsoft ActiveSync Device Response Equipment ID Enumeration
4284| [18243] Microsoft Outlook MS-DOS Device Name Attachment DoS
4285| [18241] Microsoft Outlook Express begin Keyword Message Handling DoS
4286| [18152] Microsoft IE Image File Handling Remote DoS
4287| [18008] Hosting Controller IISActions.asp Unlimited Domain Creation
4288| [17901] Hosting Controller IISManagerDB.asp Search Field SQL Injection
4289| [17893] Microsoft ASP.NET RPC/encoded Mode Malformed SOAP Message DoS
4290| [17885] Microsoft Windows Network Connections Service netman.dll Remote DoS
4291| [17860] Microsoft Windows NULL Session MSRPC Interface Remote eventlog Disclosure
4292| [17859] Microsoft Windows NULL Session svcctl MSRPC Interface SCM Service Enumeration
4293| [17830] Microsoft Windows Color Management Module ICC Profile Format Tag Remote Overflow
4294| [17829] Microsoft Office .doc Font Parsing Overflow
4295| [17826] IISWorks ASPWebMail Webmail.mdb Remote User Database Disclosure
4296| [17825] IISWorks ASPKnowledgeBase kb.mdb Remote User Database Disclosure
4297| [17824] IISWorks FileMan fileman.mdb Remote User Database Disclosure
4298| [17823] IISWorks ListPics listpics.mdb Remote User Database Disclosure
4299| [17707] Microsoft Front Page Malformed HTML Edit DoS
4300| [17680] Microsoft IE JVIEW javaprxy.dll Memory Manipulation Arbitrary Code Execution
4301| [17671] Microsoft Site Server viewcode.asp Information Disclosure
4302| [17670] Microsoft Site Server Multiple Sample Sites SQL Injection
4303| [17669] Microsoft Site Server cphost.dll Arbitrary Code Execution
4304| [17668] Microsoft Site Server cphost.dll Malformed File Upload Disk Consumption DoS
4305| [17667] Microsoft Site Server LDAP_Anonymous Account Cleartext Password Disclosure
4306| [17666] Microsoft Site Server formslogin.asp url Parameter XSS
4307| [17665] Microsoft Site Server Default.asp XSS
4308| [17664] Microsoft Site Server remind.asp Information Disclosure
4309| [17663] Microsoft Site Server auoconfig.asp Information Disclosure
4310| [17662] Microsoft Site Server VsPrAuoEd.asp Information Disclosure
4311| [17661] Microsoft Site Server VsLsLpRd.asp Information Disclosure
4312| [17660] Microsoft Site Server VsTmPr.asp Information Disclosure
4313| [17659] Microsoft Site Server vs.asp Information Disclosure
4314| [17658] Microsoft Site Server default.asp Information Disclosure
4315| [17657] Microsoft Site Server UserManager.asp Arbitrary LDAP Modification
4316| [17656] Microsoft Site Server GroupManager.asp Arbitrary LDAP Modification
4317| [17655] Microsoft Site Server DSN.asp Information Disclosure
4318| [17654] Microsoft Site Server driver.asp Information Disclosure
4319| [17653] Microsoft Site Server domain.asp Information Disclosure
4320| [17652] Microsoft Site Server findserver.asp Information Disclosure
4321| [17434] Microsoft Windows ASN.1 BERDecBitString Function Overflow
4322| [17389] Microsoft Outlook Crafted E-mail Subject Arbitrary System File Creation
4323| [17342] Microsoft ISA Server Basic Credentials Exposure
4324| [17334] Microsoft IE Script Code Obfuscation (Ghost)
4325| [17314] Microsoft IE XML Redirect Information Disclosure
4326| [17313] Microsoft IE PNG Image Processing Arbitrary Code Execution
4327| [17312] Microsoft ISA Server NetBIOS Predefined Filter Privilege Escalation
4328| [17311] Microsoft ISA Server Cache Poisoning Restriction Bypass
4329| [17310] Microsoft Agent Trusted Internet Content Spoofing (fireclicking)
4330| [17309] Microsoft Windows Web Client Request Processing Remote Code Execution
4331| [17308] Microsoft Windows Server Message Block (SMB) Remote Code Execution
4332| [17307] Microsoft Exchange Outlook Web Access HTML Email XSS
4333| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
4334| [17305] Microsoft Windows HTML Help (CHM) File Overflow
4335| [17304] Microsoft Windows Interactive Training .cbo File User Field Overflow
4336| [17218] Microsoft IE Stack Overflow Saturation DoS
4337| [17217] Microsoft IE Embedded File Recursion DoS
4338| [17176] Microsoft IE msxml3.dll Malformed Ref href Link DoS
4339| [17159] Microsoft IE Malformed FTP URL DoS
4340| [17158] Microsoft IE Crafted BMP Size Setting DoS
4341| [17131] Microsoft Windows Remote Desktop Protocol (RDP) Private Key Disclosure
4342| [17094] Microsoft IE window() Function Arbitrary Code Execution
4343| [17088] Microsoft AntiSpyware gsasDtServ.exe Path Subversion Privilege Escalation
4344| [17031] Microsoft ISA Server 2000 SecureNAT Traffic Saturation DoS
4345| [16827] Microsoft WGA Multiple Method Validation Bypass
4346| [16814] Microsoft Word mcw File Processing Overflow
4347| [16813] Microsoft ASP.NET FileStream Method Nonexistent File Request Path Disclosure
4348| [16494] Microsoft Windows Media Player WMDRM License Acquisition Page Redirection
4349| [16430] Microsoft Windows Animated Cursor (ANI) Capability AnimationHeaderBlock Length Field Overflow
4350| [16342] Microsoft IE Cross Site Mouse Click Disclosure
4351| [16196] Microsoft ASP.NET __VIEWSTATE Functionality Replay Attack
4352| [16195] Microsoft ASP.NET __VIEWSTATE Functionality Nested Request DoS
4353| [15981] Microsoft Windows XP helpctr.exe Crafted URL Command Execution
4354| [15757] Microsoft SQL Server sa Account Default Null Password
4355| [15739] Microsoft Windows Malformed Image Rendering DoS
4356| [15707] Microsoft Windows Explorer Web View Arbitrary Script Insertion
4357| [15513] RSA Authentication Agent for Web for IIS IISWebAgentIF.dll XSS
4358| [15480] Microsoft Outlook From Header Comma Parsing Failure
4359| [15479] Microsoft XP SP1 explorer.exe Malformed GIF Processing DoS
4360| [15470] Microsoft Word Unspecified Overflow
4361| [15469] Microsoft Windows MSHTA Shell Application Association Arbitrary Remote Script Execution
4362| [15467] Microsoft Exchange Server SMTP Extended Verb X-LINK2STATE Remote Overflow
4363| [15466] Microsoft IE Content Advisor Overflow
4364| [15465] Microsoft IE DHTML Object Memory Corruption Code Execution
4365| [15464] Microsoft IE wininet.dll Long Hostname Heap Corruption Code Execution
4366| [15463] Microsoft Windows IP Validation Failure Remote Code Execution
4367| [15462] Microsoft Windows CSRSS Local Overflow
4368| [15461] Microsoft Windows Object Management Malformed Request DoS
4369| [15460] Microsoft Windows Kernel Access Request Local Privilege Escalation
4370| [15459] Microsoft Windows Font Processing Local Privilege Escalation
4371| [15458] Microsoft Windows Message Queuing Remote Overflow
4372| [15379] Microsoft Windows ActiveDirectory LDAP Authentication Bypass
4373| [15363] Microsoft Windows Explorer.exe Malformed .wmf Processing DoS
4374| [15343] Microsoft Windows Server 2003 Malformed HTTP Cookie Header CGI DoS
4375| [15341] Microsoft Windows Server 2003 SMB Redirector Processing DoS
4376| [15340] Microsoft Windows Server 2003 Terminal Service Client Print DoS
4377| [15339] Microsoft Windows Server Atmf.dll Adobe Font Unloading DoS
4378| [15338] Microsoft Windows Server 2003 Terminal Session Close DoS
4379| [15337] Microsoft Windows Server 2003 CreateProcessWithLogonW() Function Process Disclosure
4380| [15336] Microsoft Windows Server 2003 Shutdown.exe Shut Down Failure
4381| [15335] Microsoft Windows Server 2003 MIT Kerberos Realm Authentication Group Policy Failure
4382| [15334] Microsoft Windows Server 2003 Shared Folder Permission Weakness
4383| [15333] Microsoft Windows Server 2003 EFS File Copy LDAP Connection DoS
4384| [15332] Microsoft Windows Server 2003 Citrix Metaframe Encryption Policy Failure
4385| [15331] Microsoft Windows Server 2003 Home Folder Path Permission Inheritance Failure
4386| [15329] Microsoft IE Malformed RSA Public Key SSL Detection Failure
4387| [15224] Microsoft IE External Caching Security Failure Arbitrary File Access
4388| [15223] Microsoft IE XHTML Formatted Comment User Confirmation Bypass
4389| [15222] Microsoft IE imagetoolbar Functionality Disable Pop Up Dereference DoS
4390| [15221] Microsoft IE Drag and Drop Zone Security Preference Bypass
4391| [15220] Microsoft IE showHelp() Function Cross Domain Code Execution
4392| [15219] Microsoft IE XML Object Arbitrary File Access
4393| [15218] Microsoft IE showHelp() Function Double Backslash Arbitrary .chm Execution
4394| [15217] Microsoft IE input Tag Rendering DoS
4395| [15216] Microsoft IE Dialog Box Cross Domain Arbitrary Program Execution
4396| [15215] Microsoft Windows SMTP E-mail Malformed Time Stamp DoS
4397| [15187] Microsoft Jet Database msjet40.dll File Parsing Overflow
4398| [15171] Microsoft Windows XP Search Function Arbitrary XML Injection
4399| [15110] Microsoft Outlook Connector for Lotus Domino Password Policy Bypass
4400| [15075] Microsoft Windows wab32.dll Malformed .wab File DoS
4401| [15011] Microsoft Windows Remote Desktop TSShutdn.exe Unauthenticated Shutdown DoS
4402| [14882] Microsoft Office InfoPath Manifest.xsf Information Disclosure
4403| [14862] Microsoft Windows GDI32.DLL GetEnhMetaFilePaletteEntries() API EMF File DoS
4404| [14801] Eudora 'Use Microsoft Viewer' Option IE Launch Arbitrary Code Execution
4405| [14793] Microsoft IE window.showHelp() HTML Help File Arbitrary Command Execution
4406| [14741] Microsoft Windows XP CommCtl32.dll Shatter Code Execution
4407| [14663] Microsoft AntiSpyware cscript/wscript Filter Bypass
4408| [14617] Microsoft Exchange Server 2003 Folder Handling DoS
4409| [14578] Microsoft Windows Malformed TCP SYN Loopback Packet Remote DoS (land)
4410| [14509] Microsoft Services for Unix Malformed RPC Client Fragment Packet DoS
4411| [14502] Microsoft Data Access Components RDS Data Stub Remote Overflow
4412| [14497] Microsoft Services for Unix RPC Library Malformed Packet Fragment DoS
4413| [14475] Microsoft Windows Script Engine for Jscript JsArrayFunctionHeapSort Overflow
4414| [14446] Microsoft Virtual Machine Java Applet Invalid Handle DoS
4415| [14445] Microsoft Virtual Machine XML Support Classes Inappropriate Methods
4416| [14430] Microsoft Commerce Server 2000 Profile Service Affected API Overflow
4417| [14399] Microsoft Windows Media Player .wmf Detection Auto-Run Weakness
4418| [14396] Microsoft ISA DNS Intrusion Detection Filter DoS
4419| [14182] Microsoft Windows Drive Restriction Group Policy Bypass
4420| [14118] Microsoft Windows Malformed ARP Packet Saturation DoS
4421| [14025] Microsoft IE Script Initiated Popup Title Bar Spoofing
4422| [13996] Microsoft Windows 2000 IKE Malformed Packet Saturation Remote DoS
4423| [13987] Microsoft Windows XP Help Center helpctr.exe Long hcp: URL Overflow
4424| [13959] Microsoft Windows Universal Plug and Play (UPnP) Malformed Request DoS
4425| [13928] Microsoft ASP.NET HttpServerUtility.HtmlEncode Unicode Character Bypass
4426| [13927] Microsoft ASP.NET Request Validation Mechanism Bypass
4427| [13762] Microsoft 2000 Domain Controller Directory Service Restore Mode Blank Password
4428| [13761] Microsoft Exchange 2000 Malformed URL Request DoS
4429| [13621] Microsoft Outlook Web Access (OWA) owalogon.asp Redirection Account Enumeration
4430| [13609] Microsoft Windows Hyperlink Object Library Overflow
4431| [13608] Microsoft IE Drag-and-Drop Privilege Escalation
4432| [13607] Microsoft IE CDF Cross-Domain Code Execution
4433| [13606] Microsoft IE createControlRange() Function Heap Corruption
4434| [13605] Microsoft IE URL Decoding Zone Spoofing Code Execution
4435| [13604] Microsoft IE Drag-and-Drop File Injection
4436| [13602] Microsoft Windows OLE Input Validation Overflow
4437| [13601] Microsoft Windows COM Structured Storage Privilege Escalation
4438| [13600] Microsoft Windows SMB Transaction Data Overflow
4439| [13599] Microsoft Windows License Logging Service Overflow
4440| [13597] Microsoft Windows Media Player PNG File Overflow
4441| [13596] Microsoft Windows XP Named Pipe Username Disclosure
4442| [13595] Microsoft Windows Sharepoint Services HTML Redirection XSS
4443| [13594] Microsoft Office XP URL Overflow
4444| [13577] Microsoft Windows NetBIOS Remote Host Information Disclosure
4445| [13510] Microsoft Index Server AllowedPaths Registry Key Index Path Disclosure
4446| [13483] Microsoft Site Server AdSamples SITE.CSC Information Disclosure
4447| [13482] Microsoft Network Monitor (Netmon) Protocol Parsing Remote Overflow
4448| [13481] Microsoft Windows NT OffloadModExpo CryptographyOffload Registry Key Permission Weakness
4449| [13480] Microsoft Windows NT MTS Package Administration Registry Key Permission Weakness
4450| [13478] Microsoft MS01-014 / MS01-016 Patch Memory Leak DoS
4451| [13477] Microsoft Windows Java Applet UDP Socket Exhaustion DoS
4452| [13476] Microsoft Windows Media Player asx Parser Multiple Tag Overflow
4453| [13475] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution Variant
4454| [13474] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution
4455| [13472] Microsoft Services for Unix Telnet Service Memory Consumption DoS
4456| [13471] Microsoft Services for Unix NFS Service Memory Consumption DoS
4457| [13441] Microsoft Windows 2000 Security Interface Change Password Option Account Enumeration
4458| [13440] Microsoft Windows XP Hot Keys Screen Lock Bypass
4459| [13438] Microsoft Windows CONVERT.EXE FAT32 File Permission Conversion Failure
4460| [13437] Microsoft Windows 2000 Debug Register Local Privilege Escalation
4461| [13436] Microsoft Exchange LDAP Filter Exceptional BER Encoding DoS
4462| [13435] Microsoft Windows XP Port 445 Malformed SYN Packet DoS
4463| [13434] Microsoft Windows Distributed Transaction Coordinator (DTC) Malformed Input DoS
4464| [13425] Microsoft .NET orderdetails.aspx OrderID Parameter Arbitrary Order Access
4465| [13424] Microsoft Windows 2000 Current Password Change Policy Bypass
4466| [13423] Microsoft Windows 2000 Terminal Server SYSVOL Share Connection Saturation Restriction Bypass
4467| [13422] Microsoft Windows PPTP Service Malformed Control Data Overflow
4468| [13421] Microsoft Windows XP RDP Malformed PDU Confirm Active Packet DoS
4469| [13420] Microsoft Windows NTFS Hard Link Audit Bypass
4470| [13419] Microsoft Windows Media Player Active Playlist Arbitrary HTML Script Execution
4471| [13418] Microsoft Virtual Machine Applet Tag Malformed CODEBASE Arbitrary File Access
4472| [13417] Microsoft Virtual Machine COM Object Arbitrary Code Execution
4473| [13416] Microsoft Windows NetDDE Agent WM_COPYDATA Message Arbitrary Code Execution (shatter)
4474| [13415] Microsoft Windows 2000 System Root Folder Search Path Permission Weakness
4475| [13414] Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS
4476| [13413] Microsoft Windows XP Windows Shell Function .mp3/.wma Custom Attribute Overflow
4477| [13412] Microsoft Virtual Machine user.dir Property Information Disclosure
4478| [13411] Microsoft Windows XP Redirector Function Long Parameter Overflow
4479| [13410] Microsoft Windows 2000 Accessibility Utility Manager Arbitrary Code Execution
4480| [13409] Microsoft Windows XP EXPLORER.EXE desktop.ini .ShellClassInfo Parameter Overflow
4481| [13408] Microsoft Windows SHELL32.DLL ShellExecute API Function Overflow
4482| [13406] Microsoft BizTalk Server BizTalkHTTPReceive.dll ISAPI Overflow
4483| [13389] Microsoft Windows DirectX QUARTZ.DLL Multiple Field .mid File Overflows
4484| [13333] Mozilla Thunderbird Microsoft IE Default Javascript Handler
4485| [13330] Microsoft Windows HKLM Registry Key Locking DoS
4486| [13325] Microsoft Network Monitor (Netmon) HTTP Protocol Parser Overflow
4487| [13308] RSA SecurID WebID sdiis.dll Direct Request DoS
4488| [13258] Microsoft IE Excel File Address Bar Spoofing
4489| [13238] Microsoft PowerPoint Action Settings Allows Invocation of Default Browser
4490| [13133] Microsoft IE iframe Tag Malformed file Attribute DoS
4491| [13132] Microsoft IE %20 URL Spoofing
4492| [13040] Microsoft IE Javascript Load Local File Path Disclosure
4493| [13020] Microsoft Windows XP RPC Cache Memory Leak
4494| [12937] Microsoft Office Encrypted Document RC4 Implementation Weakness
4495| [12918] Microsoft IE Dynamic IFRAME Tag XP SP2 File Download Security Bypass
4496| [12862] Microsoft IE USER32.CharLowerA Exception DoS
4497| [12842] Microsoft Windows Cursor and Icon Validation Code Execution
4498| [12840] Microsoft Windows HTML Help Related Topics Arbitrary Command Execution
4499| [12832] Microsoft Windows Indexing Service Query Overflow
4500| [12806] Microsoft DATA Access IPS DAV Component Remote Arbitrary Content Write
4501| [12709] Microsoft HTML Parser Malformed Javascript DoS
4502| [12698] Microsoft IE FTP Download Traversal Arbitrary Command Execution
4503| [12660] Microsoft IE with RealOne pnxr3260.dll Embed Tag Arbitrary Code Execution
4504| [12655] Microsoft Windows Active Directory LSASS.EXE DoS
4505| [12652] Microsoft Visual Basic for Applications (VBA) VBE.DLL and VBE6.DLL Long ID Overflow
4506| [12625] Microsoft Windows winhlp32.exe Overflow
4507| [12624] Microsoft Windows Kernel ANI File Parsing DoS
4508| [12623] Microsoft Windows LoadImage API Overflow
4509| [12511] Microsoft Windows Media Player ActiveX Control setItemInfo() / getItemInfo() Arbitrary WMA File Manipulation
4510| [12510] Microsoft Windows Media Player ActiveX Control getItemInfoByAtom() Function File Information Disclosure
4511| [12507] Microsoft Windows XP SP2 Popup Blocker Bypass
4512| [12482] Microsoft Windows XP Dial-Up Access Firewall Disable
4513| [12424] Microsoft IE DHTML Edit ActiveX Control execScript() XSS
4514| [12408] Cisco Unity With Microsoft Exchange Multiple Default Accounts
4515| [12378] Microsoft Windows WINS Association Context Validation Remote Code Execution
4516| [12377] Microsoft Windows NT DHCP Message Length Remote Overflow
4517| [12376] Microsoft Windows LSASS Identity Token Validation Local Privilege Escalation
4518| [12375] Microsoft Word / Wordpad Font Converter Remote Overflow
4519| [12374] Microsoft Windows HyperTerminal Session File Remote Overflow
4520| [12373] Microsoft Word / Wordpad Tables Converter Remote Overflow
4521| [12372] Microsoft Windows Kernel Application Launch Local Privilege Escalation
4522| [12371] Microsoft Windows NT Malformed DHCP Packet Remote Overflow DoS
4523| [12370] Microsoft Windows WINS Computer Name Validation Remote Code Execution
4524| [12342] Microsoft IE BASE/FORM Address Bar Spoofing
4525| [12313] Microsoft IE Cross-domain Browser Window Injection Content Spoofing
4526| [12300] Microsoft SharePoint Portal Server STSADM.log-* Log Local User Credential Disclosure
4527| [12299] Microsoft IE FTP URL Arbitrary Command Injection
4528| [12277] Microsoft IE sysimage: Local File Existence Disclosure
4529| [12258] Microsoft W3Who ISAPI (w3who.dll) Query String Remote Overflow
4530| [12257] Microsoft W3Who ISAPI (w3who.dll) Error Message XSS
4531| [12256] Microsoft W3Who ISAPI (w3who.dll) HTTP Connection Header XSS
4532| [12163] Microsoft IE Save Picture As File Extension Spoofing
4533| [12123] Microsoft Windows ipconfig.exe Overflow
4534| [12001] Microsoft Windows XP SP2 File Download Warning Bypass
4535| [12000] Microsoft Windows XP SP2 Unspecified Local Zone Access
4536| [11999] Microsoft Windows XP SP2 Unspecified Remote File Access
4537| [11958] Microsoft Outlook 2003 Image Rendering Security Policy Bypass
4538| [11957] Microsoft Outlook Express Troubleshooting Feature SMTP Auth Credential Disclosure
4539| [11956] Microsoft Outlook/Express Message body NUL Character DoS
4540| [11955] Microsoft IE/Outlook URL FORM Status Bar Spoofing
4541| [11954] Microsoft Outlook Express .dbx Deleted E-mail Persistence
4542| [11953] Microsoft Outlook Express A HREF Link Overflow DoS
4543| [11952] Microsoft Outlook Express S/MIME CA Certificate Spoofing
4544| [11951] Microsoft IE/Outlook XML File Attachment Arbitrary Script Execution
4545| [11950] Microsoft Outlook Express MIME Header Manipulation File Extension Spoofing Weakness
4546| [11949] Microsoft IE/Outlook BGSOUND Tag Information Disclosure
4547| [11948] Microsoft IE/Outlook Express IFRAME Tag Parsing Remote DoS
4548| [11947] Microsoft IE/Outlook BGSOUND Tag Parsing Remote DoS
4549| [11946] Microsoft IE/Outlook Malformed XBM File DoS
4550| [11945] Microsoft Outlook 2002 IFRAME Tag Embedded URL
4551| [11944] Microsoft Outlook 2002 HREF Tag Embedded JavaScript Execution
4552| [11943] Microsoft Outlook Image Tag Cookie Setting Bypass
4553| [11942] Microsoft Outlook Express Email Forward Blocked Attachment Access
4554| [11941] Microsoft Outlook Express HTML Frame base64 Attachment Security Bypass
4555| [11940] Microsoft Outlook Blocked Attachment Access
4556| [11939] Microsoft Outlook Attachment Spoofed Content Type
4557| [11938] Microsoft Outlook Express Attachment Filename Overflow
4558| [11937] Microsoft Outlook 98 Hidden Drive Access
4559| [11936] Microsoft Windows shlwapi.dll Malformed HTML Tag Handling Null Pointer DoS
4560| [11935] Microsoft Multiple Mail Client Read/Delivery Receipt Tag DoS
4561| [11918] Microsoft IE execCommand() File Extension Spoofing
4562| [11917] Microsoft Windows XP SP2 Spoofed Content-Location Warning Bypass
4563| [11914] Microsoft Virtual Machine JDBC API Remote Security Check Bypass
4564| [11912] Microsoft Virtual Machine JDBC Java Applet Arbitrary DLL Load
4565| [11878] Microsoft IE Crafted Path Arbitrary Cookie Overwrite
4566| [11801] Microsoft Windows Small Buffer Length SMB Packet Overflow
4567| [11799] Microsoft Windows SMB Signing Group Policy Modification
4568| [11797] Microsoft Windows DCOM RPCSS Service DCERPC Packet Overflow
4569| [11750] Microsoft Windows 2000 Message Queue Manager Queue Registration Request Overflow DoS
4570| [11742] Microsoft IE Multiple Slash Disabled Protocol/Resource Restriction Bypass
4571| [11712] Microsoft ISA Server 2000 H.323 Filter Overflow
4572| [11580] Microsoft IE res: URI Handler File Existence Disclosure
4573| [11479] Microsoft Windows NT Double Dot Samba Client DoS
4574| [11478] Microsoft Windows NT Malformed SMB Logon Request DoS
4575| [11477] Microsoft Windows NT LSASS.EXE Access Violation DoS
4576| [11476] Microsoft Windows NT DebugActiveProcess Function Privilege Escalation
4577| [11475] Microsoft Windows NT NtOpenProcessToken Permission Failure
4578| [11474] Microsoft Windows NT CSRSS Thread Exhaustion DoS
4579| [11473] Microsoft Windows NT Messenger Service Long Username DoS
4580| [11472] Microsoft Windows NT DNS Server Malformed Response DoS
4581| [11471] Microsoft Windows NT DNS Server Character Saturation DoS
4582| [11470] Microsoft Windows NT Help File Utility Overflow
4583| [11469] Microsoft Windows NT Malformed File Image Header DoS
4584| [11468] Microsoft Windows NT IOCTL Function DoS
4585| [11463] Microsoft Windows Authenticode ActiveX Install Failure Remote Code Execution
4586| [11462] Microsoft Windows HSC PCHealth System HCP URL Query Overflow
4587| [11461] Microsoft Windows Workstation Service WKSSVC.DLL Logging Function Remote Overflow
4588| [11460] Microsoft Windows RPC DCOM Interface epmapper Pipe Hijack Local Privilege Escalation
4589| [11453] Microsoft Windows 98 Malformed oshare Packet DoS
4590| [11424] Microsoft Outlook V1 Exchange Server Security Certificate Cleartext Transmission
4591| [11423] Microsoft Outlook Malformed Header DoS
4592| [11422] Microsoft Outlook Express S/MIME Parsing Routine Remote Overflow
4593| [11420] Microsoft Outlook WMP .wms File IFRAME Command Execution
4594| [11419] Microsoft Outlook Express Header Carriage Return Filter Bypass
4595| [11418] Microsoft Outlook Express text/plain MIME Content Embedded SCRIPT Tag Command Execution
4596| [11417] Microsoft Outlook/Express VCard Handler Remote Overflow
4597| [11416] Microsoft Outlook/Express Blank Header DoS
4598| [11415] Microsoft Outlook Express Forced POP3 Command Mode DoS
4599| [11395] F-Secure Anti-Virus for Microsoft Exchange Nested Password Protected Archives Bypass
4600| [11337] Microsoft IE FRAME/IFRAME/EMBED Tag Overflow
4601| [11274] Microsoft IE "
4602| [11268] Microsoft Exchange Internet Mail Service AUTH/AUTHINFO Command DoS
4603| [11265] Microsoft Windows NT Malformed RPC Packet Error Message Loop DoS (snork)
4604| [11264] Microsoft Windows NT SCM Malformed Resource Enumeration Request DoS
4605| [11259] Microsoft Windows NT Domain User Login System Policy Download Failure
4606| [11222] Microsoft XP SP2 Authenticated User Remote Shutdown
4607| [11170] Microsoft IE iframe Malformed base href DoS
4608| [11162] Microsoft Windows 95 .pwl File Weak Password Encryption
4609| [11161] Microsoft Windows 95 NetWare Remote Administration Hidden File Share
4610| [11159] Microsoft Windows NT Invalid RPC Named Pipe Saturation DoS
4611| [11158] Microsoft Windows NT Malformed Token Ring DoS
4612| [11156] Microsoft Windows NT tcpip.sys Malformed ICMP Request DoS
4613| [11152] Microsoft IE Malformed HTML Style DoS
4614| [11138] Microsoft IE HTML Rendering mshtml.dll NULL Pointer Dereference DoS
4615| [11096] Microsoft Windows ntconfig.pol Write Failure Access Restriction Bypass
4616| [11095] Microsoft Windows NT Ntconfig.pol Long Server Name Access Restriction Bypass
4617| [11094] Microsoft Windows NT User Mode Application Handle Closing DoS
4618| [11063] Microsoft Site Server Direct Mailer TMLBQueue Share Information Disclosure
4619| [11053] Microsoft Windows XP Explorer WAV Parsing DoS
4620| [11051] Microsoft Outlook cid: MIME Mishandling Forced Image Rendering
4621| [11018] Microsoft SNA Server AS/400 Local APPC LU Shared Folder Disclosure
4622| [11011] Microsoft Windows NT Netbt.sys Malformed DNS Response DoS
4623| [10999] Microsoft Windows Troubleshooter ActiveX Control Tshoot.ocx Arbitrary Code Execution
4624| [10998] Microsoft Access Snapshot Viewer ActiveX Control Arbitrary Command Execution
4625| [10997] Microsoft Windows Media Player ActiveX Control Unauthorized Media Library Manipulation
4626| [10996] Microsoft File Transfer Manager ActiveX Control Arbitrary Command Execution
4627| [10995] Microsoft File Transfer Manager ActiveX Control Arbitrary File Upload/Download
4628| [10994] Microsoft DirectX Files Viewer ActiveX Control xweb.ocx Overflow
4629| [10992] Microsoft IE Embedded HTML Help Control Cross Zone Scripting
4630| [10991] Microsoft IE HTML Help Drag and Drop Arbitrary Code Injection
4631| [10977] Microsoft Eyedog ActiveX Server Side Redirect Arbitrary Command Execution
4632| [10975] Microsoft Windows NT Winpopup Long Username DoS
4633| [10967] Microsoft IE Javascript User Homepage Address Spoofing
4634| [10938] Microsoft Windows User32.dll ComboBox CB_DIR Message Local Overflow
4635| [10937] Microsoft Windows User32.dll ListBox LB_DIR Message Local Overflow
4636| [10936] Microsoft Windows Messenger Service Message Length Remote Overflow
4637| [10935] Microsoft Word Macro Security Model Bypass
4638| [10908] Microsoft Windows XP SP2 ZIP Wizard ZoneID Tracking Failure
4639| [10895] Microsoft FrontPage asycpict.dll JPEG Processing DoS
4640| [10854] Microsoft Windows XP Zip Manager zipfldr.dll Overflow DoS
4641| [10756] Microsoft MSN heartbeat.ocx Component Overflow
4642| [10736] Microsoft Excel SYLK Macro Arbitrary Command Execution
4643| [10735] Microsoft Excel Virus Warning Mechanism Bypass
4644| [10734] Microsoft Word/Excel Shared Document INCLUDEPICTURE Field Arbitrary File Read
4645| [10733] Microsoft Word/Excel Shared Document INCLUDETEXT Field Arbitrary File Read
4646| [10714] Microsoft cabarc Traversal Arbitrary File Overwrite
4647| [10709] Microsoft IE SSL Cached Content Spoofing
4648| [10708] Microsoft IE Image Tag Arbitrary Script Execution (HijackClick 3)
4649| [10707] Microsoft IE Plug-in Navigation Address Bar Spoofing
4650| [10706] Microsoft IE Double Byte Character Set Address Bar Spoofing
4651| [10705] Microsoft IE Install Engine Inseng.dll Arbitrary Code Execution
4652| [10704] Microsoft IE Similar Method Name Redirection Cross Domain/Site Scripting
4653| [10699] Microsoft Windows Program Group Converter Arbitrary Code Execution
4654| [10698] Microsoft Windows Shell Application Start Arbitrary Code Execution
4655| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
4656| [10696] Microsoft Windows/Exchange SMTP DNS Lookup Overflow
4657| [10695] Microsoft Windows Compressed Folders DUNZIP32.DLL File Handling Overflow
4658| [10694] Microsoft Excel XLS File Local Overflow (MS04-033)
4659| [10693] Microsoft Windows Unspecified Kernel Local DoS
4660| [10692] Microsoft Windows Metafile Image Format Arbitrary Code Execution
4661| [10691] Microsoft Windows Virtual DOS Machine Subsystem Local Privilege Escalation
4662| [10690] Microsoft Windows Management APIs Local Privilege Escalation
4663| [10689] Microsoft Windows NetDDE Remote Overflow
4664| [10688] Microsoft Windows WebDAV XML Message Handler Malformed Request DoS
4665| [10686] Microsoft Windows NT RPC Library Arbitrary Memory Manipulation
4666| [10670] Microsoft ASP.NET Forms .aspx File Authentication Bypass
4667| [10648] Microsoft Windows NT Default SNMP Registry Key Permission Weakness Local Privilege Escalation
4668| [10647] Microsoft Windows CIFS Browser Protocol Arbitrary NetBIOS Cache Entry Modification
4669| [10634] Microsoft Windows 95/98 Spoofed ARP Packet Cache Manipulation
4670| [10633] Microsoft Windows 2000 Protected Store Weak Encryption Default
4671| [10618] Microsoft Windows NT autorun.inf Arbitrary Command Execution
4672| [10616] Microsoft Windows NT Fragmented IP Packet Firewall Restriction Bypass
4673| [10615] Microsoft Windows NT linux smbmount Request DoS
4674| [10614] Microsoft Windows NT %systemroot% Path Inclusion
4675| [10609] Microsoft Windows WINS Malformed Packet Consumption DoS
4676| [10608] Microsoft Windows TCP/IP Last Sequence Forced RST DoS
4677| [10607] Microsoft Windows ICMP Redirect Spoofing DoS
4678| [10606] Microsoft Windows LSA NULL Policy Handle DoS
4679| [10604] Microsoft Windows NT PATH Working Directory Inclusion
4680| [10557] Microsoft ASP.NET Canonicalization Authentication Bypass
4681| [10550] Microsoft IE Redirect Script Arbitrary XML Document Access
4682| [10549] Microsoft Word .doc Parsing Exception Arbitrary Command Execution
4683| [10456] Microsoft Windows IPv6 Packet Fragmentation Handling DoS
4684| [10379] Microsoft SQL Server Large Query DoS
4685| [10358] Microsoft Outlook Client Persistent X-UIDL Header DoS
4686| [10247] Microsoft Windows SMTP Service NTLM Null Session Mail Relay
4687| [10246] Microsoft Exchange Server Malformed NNTP AUTHINFO DoS
4688| [10240] Macromedia Multiple Products on IIS Crafted URL Application Source Disclosure
4689| [10230] Microsoft Windows XP SP2 File/Print Share Restriction Bypass
4690| [10183] Microsoft SQL Server xp_sprintf Function DoS
4691| [10181] Microsoft SQL Server formatmessage Function DoS
4692| [10166] Microsoft SQL Server raiserror Function DoS
4693| [10159] Microsoft SQL Server Multiple Extended Stored Procedure Overflows
4694| [10158] Microsoft SQL Server Password Encryption Procedure Overflow
4695| [10157] Microsoft SQL Server BULK INSERT Query Overflow
4696| [10156] Microsoft SQL Server SQLExecutiveCmdExec Account Credential Encryption Weakness
4697| [10155] Microsoft SQL Server Enterprise Manager Authentication Credential Encryption Weakness
4698| [10154] Microsoft SQL Server xp_SetSQLSecurity Function Overflow
4699| [10153] Microsoft SQL Server xp_proxiedmetadata Function Overflow
4700| [10152] Microsoft SQL Server xp_printstatements Function Overflow
4701| [10151] Microsoft SQL Server xp_peekqueue Function Remote Overflow
4702| [10150] Microsoft SQL Server xp_updatecolvbm Function Overflow
4703| [10149] Microsoft SQL Server xp_showcolv Function Remote Overflow
4704| [10148] Microsoft SQL Server xp_enumresultset Function Overflow
4705| [10147] Microsoft SQL Server xp_displayparamstmt Function Overflow
4706| [10146] Microsoft SQL Server xp_sprintf Function Overflow
4707| [10145] Microsoft SQL Server formatmessage Function Overflow
4708| [10144] Microsoft SQL Server raiserror Function Overflow
4709| [10143] Microsoft SQL Server OpenRowset OLE DB Provider Name Overflow
4710| [10142] Microsoft SQL Server OpenDataSource OLE DB Provider Name Overflow
4711| [10141] Microsoft SQL Server sestup.iss File Authentication Credential Disclosure
4712| [10140] Microsoft SQL Server Stored Procedure Arbitrary Command Execution
4713| [10139] Microsoft SQL Server Agent Arbitrary File Creation
4714| [10138] Microsoft SQL Server xp_displayparamstmt Procedure Privilege Escalation
4715| [10137] Microsoft SQL Server xp_printstatements Procedure Privilege Escalation
4716| [10136] Microsoft SQL Server xp_execresultset Procedure Privilege Escalation
4717| [10135] Microsoft SQL Server Malformed 0x08 Packet DoS
4718| [10133] Microsoft SQL Server sp_MScopyscript Procedure scriptfile Parameter Arbitrary Code Execution
4719| [10132] Microsoft SQL Server Authentication Function Remote Overflow
4720| [10131] Microsoft SQL Server DBCC SourceDB Argument Arbitrary Command Execution
4721| [10129] Microsoft Data Access Components SQL-DMO Broadcast Request Overflow
4722| [10127] Microsoft SQL Server xp_runwebtask Procedure Privilege Escalation
4723| [10126] Microsoft SQL Server CreateFile API Function Privilege Escalation
4724| [10125] Microsoft SQL Server Named Pipe Hijack Privilege Escalation
4725| [10123] Microsoft SQL Server LPC Packet Handling Local Overflow
4726| [10104] Microsoft BizTalk Server DTA RawCustomSearchField.asp SQL Injection
4727| [10103] Microsoft BizTalk Server DTA rawdocdata.asp SQL Injection
4728| [10006] Microsoft WordPerfect Converter Corel File Multiple Parameter Remote Overflow
4729| [9951] Microsoft Multiple Products GDIPlus.dll JPEG Processing Overflow
4730| [9896] Microsoft Netmeeting Remote Desktop Sharing Remote Session Hijack
4731| [9895] Microsoft NetMeeting Arbitrary Clipboard Content Disclosure
4732| [9818] F-Secure Anti-Virus For Microsoft Exchange Content Scanner Server Exception Handling DoS
4733| [9722] Microsoft Windows NT System Critical Registry Key Contain Bad Value
4734| [9671] Microsoft IE onUnload Address Bar Spoofing
4735| [9579] Microsoft Windows NT GetThreadContext/SetThreadContext Kernel Mode Address DoS
4736| [9560] HP Systems Insight Manager Microsoft Security Patch Login DoS
4737| [9530] Microsoft Windows CRL File Digital Signature Verification Failure
4738| [9386] Microsoft Windows 2000 msinfo32.exe msinfo_file Variable Overflow
4739| [9359] Microsoft Windows Page File pagefile.sys Information Disclosure
4740| [9358] Microsoft Windows NT Event Log Inappropriate Permissions
4741| [9356] Microsoft Windows NT HKEY_CLASSES_ROOT Key Inappropriate System-Critical Permissions
4742| [9355] Microsoft Windows NT HKEY_LOCAL_MACHINE Key Inappropriate System-Critical Permissions
4743| [9349] Microsoft Windows NT Systems User Audit Policy Logging Weakness
4744| [9348] Microsoft Windows NT Non-NTFS File System Insecure
4745| [9207] Microsoft Content Management ManualLogin.asp REASONTXT Parameter XSS
4746| [9189] Microsoft ASP.Net Null Character XSS Protection Bypass
4747| [9172] Microsoft IE File/Directory Existence Disclosure
4748| [9167] Microsoft Outlook Express BCC: Recipient Information Disclosure
4749| [9152] Microsoft Windows XP SP2 Zone Identifier Object Value Warning Failure
4750| [9141] Microsoft Windows File Icon Spoofing
4751| [9140] Microsoft Windows XP Content-Location Local Computer Zone Bypass
4752| [9070] Microsoft IE dragDrop Arbitrary File Upload (What a Drag II)
4753| [9012] Microsoft Windows XP Internet Connection Firewall Bypass
4754| [8978] Microsoft IE Address Bar Spoofing (NullyFake)
4755| [8941] Microsoft IE Merlin.speak Function CPU DoS
4756| [8706] Solaris mibiisa MIB Parsing Remote Overflow
4757| [8428] Microsoft NetMeeting Malformed Packets DoS
4758| [8414] Microsoft IE mms: Protocol Handler Arbitrary Command
4759| [8368] Microsoft Windows XP/2003 Login Screen Consumption DoS
4760| [8335] Microsoft IE mshtml.dll Null Pointer DoS
4761| [8334] Microsoft Windows NT \?? Object Folder Symlink Privilege Escalation
4762| [8277] Microsoft IE Malformed GIF Double-free DoS
4763| [8276] Microsoft IE Malformed BMP Overflow
4764| [8275] Microsoft IE Navigation Cross Domain Execution (InsiderPrototype)
4765| [8243] Microsoft SMS Port 2702 DoS
4766| [8224] Microsoft IE CSS Memory Corruption DoS
4767| [8211] Microsoft Exchange Server Malformed SMTP Command DoS
4768| [8210] Microsoft HTML Control Large Form Field DoS
4769| [8161] Microsoft Windows NT Invalid User Privileges
4770| [8160] Microsoft Windows NT File/Directory Invalid Permissions
4771| [8148] Microsoft IE Arbitrary File Write (What a Drag)
4772| [8129] Microsoft IE CSS Malformed div element DoS
4773| [8112] Microsoft Windows NT Weak Account Password Policy
4774| [8053] Microsoft Virtual Machine Illegal Cast Operation Command Execution
4775| [8052] Microsoft ActiveX Control Arbitrary Cabinet File Execution
4776| [8051] Microsoft Windows Networking Software Long Filename Handling Arbitrary Command Execution
4777| [7963] Microsoft IE parent.window.open location.cache Script Execution
4778| [7951] Microsoft SMS Remote Control Client DoS
4779| [7916] Microsoft IE Multimedia Page XSS (viaSWFurl)
4780| [7915] Microsoft IE ADODB.Stream Media Arbitrary File Execution
4781| [7914] Microsoft IE .FOLDER File Type Execution
4782| [7913] Microsoft IE Shell.Application ActiveX Arbitrary Command Execution
4783| [7912] Microsoft IE showHelp() Arbitrary File Execution
4784| [7910] Microsoft IE Double Slash Cache File Execution (DblSlashForCache)
4785| [7909] Microsoft IE Cache Location Information Disclosure (execdror6)
4786| [7907] Microsoft IE FileSystemObject ActiveX Object Arbitrary Command Execution
4787| [7906] Microsoft IE WebBrowser ActiveX Object Clipboard Content Disclosure
4788| [7905] Microsoft IE ie5setup.exe Multple Service Disable
4789| [7904] Microsoft Windows Media Player ActiveX File Existence Disclosure
4790| [7903] Microsoft IE external.NavigateAndFind Arbitrary File Access
4791| [7902] Microsoft IE / Outlook Express Active Scripting Arbitrary E-mail Message Access
4792| [7901] Microsoft IE Active Setup ActiveX Component Arbitrary Software Installation
4793| [7900] Microsoft IE WebBrowser Control NavigateComplete2 Policy Bypass
4794| [7899] Microsoft IE with ActivePython ActiveX Control Arbitrary File Read
4795| [7898] Microsoft IE with Google Toolbar Malicious HTML DoS
4796| [7897] Microsoft IE Crafted Filename Arbitrary Visual FoxPro Application Execution
4797| [7896] Microsoft IE Java Implementation Malformed Domain Portion Arbitrary Script Execution
4798| [7895] Microsoft IE MS-DOS Device Name URL DoS
4799| [7894] Microsoft IE Object Tag Type Property Double-byte Overflow
4800| [7893] Microsoft IE window.open file: Security Bypass (WsOpenFileJPU)
4801| [7892] Microsoft IE href Javascript Arbitrary Command Execution (BodyRefreshLoadsJPU)
4802| [7891] Microsoft Windows IE window.moveBy Function Pointer Hijack (HijackClickV2)
4803| [7890] Microsoft IE Download Function Cache Disclosure (threadid10008)
4804| [7889] Microsoft IE createTextRange Security Bypass (LinKiller)
4805| [7888] Microsoft IE createRange FIND Dialog Security Bypass (Findeath)
4806| [7887] Microsoft IE XML Data Binding Object Tag Arbitrary Command Execution
4807| [7886] Microsoft Java Virtual Machine StandardSecurityManager Restriction Bypass
4808| [7885] Microsoft Java Implementation Applet Tag DoS
4809| [7884] Microsoft Java Virtual Machine Passed HTML Object DoS
4810| [7883] Microsoft Java Implementation CabCracker Class Security Bypass
4811| [7882] Microsoft Java Applet Codebase Tag Arbitrary File Read
4812| [7881] Microsoft Java Implementation INativeServices Clipboard Content Disclosure
4813| [7880] Microsoft Java INativeServices Arbitrary Memory Information Disclosure
4814| [7879] Microsoft Java getAbsolutePath Current Directory Disclosure
4815| [7878] Microsoft Java Virtual Machine ClassLoader.loadClass Overflow
4816| [7877] Microsoft Java Virtual Machine Class.forName Overflow
4817| [7876] Microsoft IE .isp File Arbitrary Command Execution
4818| [7874] Microsoft IE Cross-domain Sub-frame Navigation Content Spoofing
4819| [7872] Microsoft IE ActiveX Object Code Arbitrary Command Execution (Qhosts)
4820| [7866] Microsoft IE Frame Spoofing Content Injection
4821| [7864] Microsoft IE URL History FTP Credential Disclosure
4822| [7863] Microsoft IE OBJECT Tag Long CLASSID DoS
4823| [7862] Microsoft IE User DAT File History Disclosure
4824| [7861] Microsoft IE Standard Cache Control Authentication Credential Leak
4825| [7860] Microsoft IE Java JSObject Cross Frame Security Policy Bypass
4826| [7859] Microsoft IE Frame Domain Verification Arbitrary File Access
4827| [7858] Microsoft IE CLSID Alteration Arbitrary Command Execution
4828| [7857] Microsoft IE Script Tag SRC Value Arbitrary File Access
4829| [7856] Microsoft IE Q312461 Patch HTTP_USER_AGENT Information Disclosure
4830| [7855] Microsoft IE on Windows ME Javascript Cookie Set Bypass
4831| [7854] Microsoft IE Chinese Character Scrolling DoS
4832| [7853] Microsoft IE window.createPopup Chromeless Window Spoofing
4833| [7852] Microsoft IE showModelessDialog Infinite Loop DoS
4834| [7851] Microsoft IE Multiple Form Field DoS
4835| [7850] Microsoft IE Malformed Content Header Arbitrary Command Execution
4836| [7849] Microsoft IE Javascript location.replace Recursive DoS
4837| [7848] Microsoft IE userData storeuserData Cookie Privacy Setting Bypass
4838| [7847] Microsoft IE JVM System.out.println Logging Arbitrary Command Execution
4839| [7846] Microsoft IE PNG Invalid Length Code DoS
4840| [7845] Microsoft IE Encoded URL Information Disclosure
4841| [7844] Microsoft IE Object Tag Temporary File Information Disclosure
4842| [7843] Microsoft IE URLMON.DLL Multiple Overflows
4843| [7842] Microsoft IE File Upload Control Arbitrary File Access
4844| [7841] Microsoft IE Scriptlet Component Arbitrary File Access
4845| [7840] Microsoft IE Javascript Applet Data Redirect Arbitrary File Access
4846| [7839] Microsoft IE Malformed Favorite Icon Arbitrary Command Execution
4847| [7838] Microsoft IE File Upload Control Paste Arbitrary File Read
4848| [7837] Microsoft IE Cross Frame Security Arbitrary File Access
4849| [7836] Microsoft IE EMBED Tag Overflow
4850| [7835] Microsoft IE IFRAME Document.ExecCommand Restriction Bypass Arbitrary File Access
4851| [7834] Microsoft IE Preloader Legacy ActiveX Arbitrary File Access
4852| [7833] Microsoft IE/OE res: Protocol Library Overflow
4853| [7832] Microsoft IE Client Window Reference Server Side Arbitrary File Access
4854| [7831] Microsoft IE Virtual Machine Java Applet Sandbox Bypass
4855| [7830] Microsoft IE mk: URL Handling Remote Overflow
4856| [7829] Microsoft IE JScript Engine Window.External Function Arbitrary Command Execution
4857| [7828] Microsoft IE Dotless IP Address Zone Privilege Escalation
4858| [7827] Microsoft IE Cross Security Domain Arbitrary File Access
4859| [7826] Microsoft IE SSL Certificate Validation Failure (v2)
4860| [7825] Microsoft IE Domain Frame Arbitrary File Access
4861| [7824] Microsoft IE Virtual Machine Unsigned Applet Arbitrary Command Execution
4862| [7823] Microsoft IE Cached Content .chm Arbitrary Program Execution
4863| [7822] Microsoft IE HTML Form Input Element Arbitrary File Access
4864| [7821] Microsoft IE Print Templates Feature Arbitrary ActiveX Execution
4865| [7820] Microsoft IE Scriptlet Invoking ActiveX Arbitrary File Access
4866| [7819] Microsoft IE Small IFRAME DHTML Arbitrary File Access
4867| [7818] Microsoft IE Page Redirect Authentication Credential Leak
4868| [7817] Microsoft IE Frame Domain Validation Arbitrary File Access
4869| [7816] Microsoft IE SFU Telnet Client Arbitrary Command Execution
4870| [7806] Microsoft IE HTML E-mail Feature Unusual MIME Type Command Execution
4871| [7804] Microsoft Windows HTML Help Arbitrary Code Execution
4872| [7803] Microsoft Windows showHelp Arbitrary Code Execution
4873| [7802] Microsoft IE File Download Extension Spoofing
4874| [7801] Microsoft IE Javascript window.open Null-Pointer DoS
4875| [7800] Microsoft Windows POSIX Subsystem Privilege Escalation
4876| [7798] Microsoft Windows Task Scheduler Remote Overflow
4877| [7793] Microsoft Outlook Express Header Validation DoS
4878| [7779] Microsoft IE AnchorClick Cross Zone Scripting
4879| [7778] Microsoft Outlook Window Opener Script Execution
4880| [7777] Microsoft Windows Media Control Preview Script Execution
4881| [7776] Microsoft IE Download Window Filename Filetype Spoofing
4882| [7775] Microsoft IE Channel Link Script Injection
4883| [7774] Microsoft IE Popup.show() Click Hijack (HijackClick 3)
4884| [7769] Microsoft Outlook With Word Editor Object Tag Code Execution
4885| [7762] Microsoft Java Virtual Machine Cross-Site Communication
4886| [7739] Microsoft IE plugin.ocx Load() Method Overflow
4887| [7738] Microsoft Windows Media Player Skins File Arbitrary Command Execution
4888| [7608] Microsoft Index Server Internet Data Query Path Disclosure
4889| [7607] Microsoft IE CSS Unterminated Comment Handling Memory Corruption
4890| [7576] Microsoft Windows NT RSHSVC .Rhosts Unauthorized Access
4891| [7405] Microsoft Phone Dialer (dialer.exe) Dialer Entry Overflow
4892| [7296] Microsoft IE Cross-domain Frame Injection Content Spoofing
4893| [7293] Microsoft Plus! Compressed Folder Password Disclosure
4894| [7202] Microsoft PowerPoint 2000 File Loader Overflow
4895| [7187] Microsoft MN-500 Web Administration Multiple Connections DoS
4896| [7182] Microsoft Windows Media Unicast Service Severed Connection Memory Leak DoS
4897| [7179] Microsoft Windows 2000 Event Viewer Snap-in Overflow
4898| [7178] Microsoft Windows Media Player WMP ActiveX Control Javascript Command Execution
4899| [7168] Microsoft Data Access Component Internet Publishing Provider WebDAV Security Zone Bypass
4900| [7117] Microsoft Windows RPC Locator Remote Overflow
4901| [7096] Microsoft Outlook Express Mac OS Auto HTML Download
4902| [7055] Microsoft Outlook Express for Mac OS E-mail Long Line DoS
4903| [6971] Microsoft ISA Server 2000 ICMP Rule Bypass During Startup
4904| [6970] Microsoft ISA Server 2000 Web Publishing Unencrypted Credentials Disclosure
4905| [6969] Microsoft ISA Server 2000 Invalid DNS Request DoS
4906| [6968] Microsoft ISA Server 2000 FTP Port Scan Bounce Weakness
4907| [6967] Microsoft ISA Server 2000 UDP Packet Winsock DoS
4908| [6965] Microsoft ISA Server 2000 SSL Packet DoS
4909| [6964] Microsoft ISA Server 2000 DNS Intrusion Detection Filter DoS
4910| [6963] Microsoft IE showModalDialog Method Arbitrary Code Execution
4911| [6931] Microsoft IE/Outlook Double Null Character DoS
4912| [6790] Microsoft Windows NT AEDebug Registry Key Weak Permissions
4913| [6749] Microsoft Crystal Reports Web Viewer crystalimagehandler.aspxArbitrary File Access
4914| [6742] Microsoft DirectPlay Packet Validation DoS
4915| [6674] Microsoft Office 98 for Macintosh Disk Space Information Disclosure
4916| [6672] Microsoft SharePoint with MSIE settings.htm Authentication Bypass
4917| [6640] Macromedia JRun IIS ISAPI error-handling .jsp File Overflow
4918| [6639] Macromedia JRun IIS ISAPI error-handling .cfm File Overflow
4919| [6538] Microsoft IE/Outlook ImageMap URL Spoofing
4920| [6515] Microsoft Windows 2000 Domain Expired Account Authentication
4921| [6272] Microsoft IE MIME Content-Type Header Processing Weakness Cross-content XSS
4922| [6221] Microsoft Windows XP desktop.ini CLSID Arbitrary Command Execution
4923| [6217] Microsoft Outlook RTF Embedded Object Security Bypass
4924| [6121] Microsoft Outlook Express BASE HREF Web Content Loading
4925| [6080] Microsoft IE MSHTML.DLL Cross-Frame Script Execution
4926| [6079] Microsoft Outlook Remote XML Loading
4927| [6074] Microsoft Windows Me HSC hcp:// URL XSS
4928| [6053] Microsoft Windows Help and Support Center HCP URL Code Execution
4929| [6031] Microsoft Exchange Multiple SMTP Command DoS
4930| [6007] Microsoft IE/Outlook IMG/HREF Tag Code Execution
4931| [5998] Microsoft Outlook Predictable File Caching
4932| [5993] Microsoft Active Server Pages (ASP) Engine Malformed Cookie Handling Remote Information Disclosure
4933| [5968] Microsoft Windows ARP Packet DoS
4934| [5966] Microsoft Windows NT SMB Traversal Arbitrary File Access
4935| [5965] Microsoft IE MSHTML.DLL IMG SRC Tag Information Disclosure
4936| [5936] Microsoft SMTP Service 4xx Error Code DoS
4937| [5887] Microsoft Access 97 Cleartext Password Storage
4938| [5884] Microsoft Site Server ASP Upload Remote Command Execution
4939| [5869] Microsoft IE MSHTML.DLL Javascript %01 URL Arbitrary File Access
4940| [5858] Microsoft Windows NT Rshsvc.exe Arbitrary Command Execution
4941| [5855] Microsoft Exchange MTA HELO Command Remote Overflow
4942| [5694] Microsoft IE Address Bar URL Spoofing
4943| [5687] Microsoft Windows IE and Explorer Share Name Overflow
4944| [5686] Microsoft Windows Telnet Service Account Information Disclosure
4945| [5608] Microsoft NetMeeting Malformed String DoS
4946| [5581] Trend Micro ScanMail for Microsoft Exchange Administrative Credential Disclosure
4947| [5563] Microsoft IE Telnet Client SFU Arbitrary Command Execution
4948| [5558] Microsoft Windows Media Player Advanced Streaming Format Overflow
4949| [5557] Microsoft Outlook Web Access With IE Embedded Script Execution
4950| [5556] Microsoft IE Dotless IP Intranet Zone Spoofing
4951| [5419] Microsoft IE mshtml.dll EMBED Directive Overflow
4952| [5390] Microsoft Exchange NTLM Null Session Mail Relay
4953| [5357] Microsoft Multiple Products for Mac File URL Overflow
4954| [5356] Microsoft IE for Mac Local AppleScript Invocation
4955| [5355] Microsoft MSN Chat ActiveX ResDLL Parameter Overflow
4956| [5347] Microsoft SQL Server SQLXML ISAPI Extension Remote Overflow
4957| [5343] Microsoft SQL Server SQLXML root Parameter XSS
4958| [5342] Microsoft IE Malformed Web Page Zone Spoofing
4959| [5313] Microsoft Windows Media Device Manager Invalid Local Storage Device Privilege Escalation
4960| [5312] Microsoft Windows Media Player .wma IE Cache Arbitrary Code Execution
4961| [5261] Microsoft Windows ASN.1 Double Free Code Execution
4962| [5260] Microsoft Windows SSL Library Malformed Message Remote DoS
4963| [5259] Microsoft Windows Negotiate SSP Code Execution
4964| [5258] Microsoft Windows Virtual DOS Machine Privilege Escalation
4965| [5257] Microsoft Windows Local Descriptor Table Privilege Escalation
4966| [5256] Microsoft Windows Unspecified H.323 Code Execution
4967| [5255] Microsoft Windows Management Privilege Escalation
4968| [5254] Microsoft Windows Utility Manager Privilege Escalation
4969| [5253] Microsoft Windows Help and Support Center Command Execution
4970| [5252] Microsoft Windows Metafile Code Execution
4971| [5251] Microsoft Windows Winlogon Command Execution
4972| [5250] Microsoft Windows SSL Library Private Communications Transport (PCT) Remote Overflow
4973| [5249] Microsoft Windows LDAP Crafted Request Remote DoS
4974| [5248] Microsoft Windows LSASS Remote Overflow
4975| [5247] Microsoft Windows DCOM RPC Object Identity Information Disclosure
4976| [5246] Microsoft Windows CIS/RPC Over HTTP DoS
4977| [5245] Microsoft Windows RPCSS Large Length Field DoS
4978| [5242] Microsoft IE/Outlook MHTML .chm ITS Protocol Handler Code Execution
4979| [5241] Microsoft Jet Database Engine Remote Code Execution
4980| [5179] Microsoft Windows 2000 microsoft-ds DoS
4981| [5175] Microsoft Excel Hyperlinked Workbook Arbitrary Code Execution
4982| [5174] Microsoft Excel Inline Macro Arbitrary Code Execution
4983| [5173] Microsoft Excel Embedded XSL Stylesheet Arbitrary Code Execution
4984| [5172] Microsoft Commerce Server OWC Installer LocalSystem Arbitrary Code Execution
4985| [5171] Microsoft Word 2002 Mail Merge Tool Execute Arbitrary Script
4986| [5170] Microsoft Commerce Server OWC Installer Arbitrary Command Execution
4987| [5163] Microsoft Commerce Server AuthFilter ISAPI Filter Overflow
4988| [5162] Microsoft IE Legacy Data-island Capability Read Arbitrary XML File
4989| [5152] Microsoft Legacy Text Formatting ActiveX Control Overflow
4990| [5134] Microsoft IE Reference Local HTML Resource Script Execution
4991| [5133] Microsoft Metadirectory Services LDAP Client Authentication Bypass
4992| [5129] Microsoft IE Download File Origin Spoofing
4993| [5126] Microsoft BackOffice Authentication Bypass
4994| [5124] Microsoft TSAC ActiveX Long Server Name Overflow
4995| [5064] Microsoft SQL Server Jet Engine OpenDataSource Function Overflow
4996| [4968] Microsoft SharePoint Portal Server Multiple Unspecified XSS
4997| [4951] Microsoft IE CLASSID Remote DoS
4998| [4932] Microsoft Outlook Web Access SecurID Authentication Bypass
4999| [4931] iisPROTECT Admin Interface SiteAdmin.ASP GroupName Parameter SQL Injection
5000| [4915] Microsoft Content Management Server (MCMS) Web Authoring Command File Upload Arbitrary Code Execution
5001| [4914] Microsoft Content Management Server (MCMS) Resource Request SQL Injection
5002| [4877] Microsoft Windows Terminal Services Kerberos Double Authorization Data Entry
5003| [4862] Microsoft Content Management Server (MCMS) Unspecified Authentication Function Overflow
5004| [4779] Microsoft Desktop Engine (MSDE) 2000 Stored Procedure SQL Injection
5005| [4778] Microsoft SQL Server 2000 Stored Procedure SQL Injection
5006| [4777] Microsoft Desktop Engine (MSDE) 2000 Database Consistency Checkers (DBCCs) Overflow
5007| [4776] Microsoft SQL Server 2000 Database Consistency Checkers (DBCCs) 2000 Overflow
5008| [4734] InoculateIT Microsoft Exchange Inbox Folder Tree Moved Message Scanning Bypass
5009| [4654] iisCart2000 File Upload
5010| [4627] Microsoft IE Text Control Overflow
5011| [4626] Microsoft DirectX Files Viewer xweb.ocx Overflow
5012| [4578] Microsoft SQL Resolution Service Monitor Thread Registry Key Name Overflow
5013| [4577] Microsoft SQL Resolution Service 0x08 Byte Long String Overflow
5014| [4513] Microsoft Visual C++ Constructed ISAPI Extensions
5015| [4467] Microsoft Windows WebDav ntdll.dll Remote Overflow
5016| [4186] Microsoft IE Cookie Path Traversal
5017| [4170] Microsoft Windows 2000 Server Media Services TCP Packet Handling Remote DoS
5018| [4168] Microsoft Outlook 2002 mailto URI Script Injection
5019| [4078] Microsoft IE Cross Frame Scripting Restriction Bypass
5020| [3968] Microsoft FrontPage Personal Web Server Arbitrary File Access
5021| [3903] Microsoft Windows WINS Server Remote Overflow
5022| [3902] Microsoft Windows ASN.1 Library Integer Overflow
5023| [3893] Microsoft Virtual PC for Mac Insecure Temporary Files Creation
5024| [3879] Microsoft IE File Identification Variant
5025| [3791] Microsoft IE Travel Log Arbitrary Script Execution
5026| [3738] Microsoft IE Content-disposition Header File Download Extension Spoofing
5027| [3711] Microsoft Windows XP Malicious Folder Automatic Code Execution
5028| [3501] Microsoft FrontPage form_results Information Disclosure
5029| [3490] Microsoft Exchange 2003 OWA Mailbox Access Information Disclosure
5030| [3457] Microsoft MDAC Broadcast Reply Overflow
5031| [3386] Microsoft FrontPage Server Extensions htimage.exe File Existence Enumeration
5032| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
5033| [3384] Microsoft FrontPage htimage.exe Overflow
5034| [3383] Microsoft FrontPage Server Extensions imagemap.exe File Verification
5035| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
5036| [3381] Microsoft FrontPage imagemap.exe Overflow
5037| [3337] ColdFusion on IIS cfm/dbm Diagnostic Error Path Disclosure
5038| [3313] Microsoft Word Form Protection Bypass
5039| [3307] Microsoft IE showHelp() Zone Restriction Bypass
5040| [3300] Microsoft FrontPage shtml MS-DOS Device Name DoS
5041| [3225] Microsoft IE for Mac Information Disclosure
5042| [3213] SecureIIS Error Page Information Disclosure
5043| [3212] SecureIIS Encoded URI Arbitrary File Access
5044| [3211] SecureIIS HTML Encoded Characters Bypass Ruleset
5045| [3209] SecureIIS HTTP Request Overflow Protection Bypass
5046| [3195] Microsoft Exchange OWA REFERER Header XSS
5047| [3184] IISShield HTTP Request Bypass Ruleset
5048| [3183] iisPROTECT Encoded URL Authentication Bypass
5049| [3144] Microsoft IE MHTML Redirection Local File Parsing (MhtRedirParsesLocalFile)
5050| [3143] Microsoft IE MHTML Arbitrary File Execution (MhtRedirLaunchInetExe)
5051| [3142] Microsoft IE Subframe XSS (BackToFramedJpu)
5052| [3111] Microsoft IE Windows Scripting Host (WSH) GetObject Javascript Function Arbitrary File Access
5053| [3108] Microsoft Office 98 Macintosh Information Disclosure
5054| [3106] Microsoft Windows Password Authentication Security Point of Failure
5055| [3104] Microsoft IE PPC Overwrite Arbitrary Files
5056| [3099] Microsoft IE _search Window Execute Code (WsBASEjpu)
5057| [3098] Microsoft IE history.back NAF Function Execute Script (NAFjpuInHistory)
5058| [3097] Microsoft IE window.open Function Execute Code (WsFakeSrc)
5059| [3096] Microsoft IE NavigateAndFind Function Execute Code (NAFfileJPU)
5060| [3095] Microsoft IE history.back Function Information Disclosure (RefBack)
5061| [3094] Microsoft IE window.moveBy Cursor Hijack (HijackClick)
5062| [3068] Microsoft IE MSHTML/EditFlag Auto Open DoS
5063| [3067] Microsoft Windows Media Player ASF File Arbitrary Code Execution
5064| [3066] Microsoft IE Custom HTTP Errors Script Injection
5065| [3065] Microsoft IE Unparsable XML File XSS
5066| [3056] Microsoft IE MSN/Alexa Information Leak
5067| [3055] Microsoft IE Spoofed URL
5068| [3054] Microsoft IE %USERPROFILE% Folder Disclosure
5069| [3053] Microsoft IE MHTML File Handler Arbitrary Script Injection
5070| [3052] Microsoft IE/Outlook CODEBASE PopUp Object Remote Execution
5071| [3051] Microsoft IE MHT Web Archive Overflow
5072| [3050] Microsoft IE dragDrop Method Local File Reading
5073| [3049] Microsoft IE ftp.htt FTP Web View URL XSS
5074| [3036] Microsoft IE dynsrc File Information Leak
5075| [3035] Microsoft WebBrowser Control t:video File Execution
5076| [3034] Microsoft IE JavaScript script src Local File Enumeration
5077| [3033] Microsoft IE Content Type/Disposition File Execution
5078| [3032] Microsoft IE XMLHTTP Control Arbitrary Remote File Access
5079| [3031] Microsoft IE document.Open Same Origin Policy Violation
5080| [3030] Microsoft IE GetObject() Function Traveral Arbitrary File Access
5081| [3029] Microsoft IE Cookie Execute Script in Local Computer Zone
5082| [3028] Microsoft IE Content-disposition Header Auto Download/Execute
5083| [3011] Microsoft IE OWC ConnectionFile File Existence Verification
5084| [3010] Microsoft IE OWC XMLURL File Existence Verification
5085| [3009] Microsoft IE OWC Load File Existence Verification
5086| [3008] Microsoft IE OWC Cut/Paste Data Read and Injection
5087| [3007] Microsoft IE OWC LoadText Read Arbitrary File
5088| [3006] Microsoft IE OWC Script Execution
5089| [3005] Microsoft IE WebBrowser Control dialogArguments XSS
5090| [3004] Microsoft IE Gopher Client Overflow
5091| [3003] Microsoft IE/Outlook OBJECT Cross Domain Scripting
5092| [3002] Microsoft IE File Extension Dot Parsing
5093| [3001] Microsoft IE XP HCP URI Handler File Deletion
5094| [2999] Microsoft IE Powerpoint Mouse-Over Execute
5095| [2998] Microsoft IE Frame Javascript URL Cross-Domain Script Execution
5096| [2997] Microsoft IE oIFrameElement.Document IFRAME Bypass
5097| [2996] Microsoft IE Object Zone Redirection
5098| [2995] Microsoft IE (VictimWindow).document.write Cross Domain Scripting (SaveRef)
5099| [2994] Microsoft IE (NewWindow).location.assign Save Reference
5100| [2993] Microsoft IE % URL Encoding XSS
5101| [2992] Microsoft IE HTML Help ActiveX Control alink and showHelp Overflow
5102| [2991] Microsoft WinHlp Active-X Item Parameter Overflow
5103| [2990] Microsoft IE IFRAME dialogArguments Object Bypass (BadParent)
5104| [2986] Microsoft IE clipboardData Object Caching Cross-domain Policy Bypass
5105| [2985] Microsoft IE execCommand Object Caching
5106| [2984] Microsoft IE getElementsByTagName Object Caching
5107| [2983] Microsoft IE getElementsByName Object Caching
5108| [2982] Microsoft IE getElementById Object Caching
5109| [2981] Microsoft IE elementFromPoint Object Caching
5110| [2980] Microsoft IE createRange Object Caching
5111| [2979] Microsoft IE external Object Caching
5112| [2978] Microsoft IE showModalDialog Object Caching
5113| [2977] Microsoft IE XML Datasource Read Local Files
5114| [2976] Microsoft IE CTRL Key onkeydown Remote File Theft
5115| [2975] Microsoft IE Back Button XSS
5116| [2974] Microsoft IE/Outlook Temporary Internet File Execution
5117| [2973] Microsoft IE Third Party Plugin Rendering XSS
5118| [2972] Microsoft IE showModalDialog Script Execution
5119| [2971] Microsoft WMP File Attachment Script Execution
5120| [2970] Microsoft IE cssText Arbitrary File Access
5121| [2969] Microsoft VM Bytecode Verifier Execute Arbitrary Code
5122| [2968] Microsoft IE File Download Dialog Overflow
5123| [2967] Microsoft IE Object Type Property Overflow
5124| [2966] Microsoft IE BR549.DLL Overflow
5125| [2965] Microsoft IE Cache Script Execution in My Zone
5126| [2963] Microsoft IE align HTML Converter Overflow
5127| [2960] Microsoft Windows Messenger Service Social Engineering Weakness
5128| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
5129| [2917] Microsoft Access Known Database Attack
5130| [2801] Microsoft Word and Excel Execution of Arbitrary Code
5131| [2800] Microsoft FrontPage Server Extensions SmartHTML DoS
5132| [2784] Microsoft IE Component Function Information Disclosure
5133| [2783] Microsoft IE XML Objection Information Disclosure (IredirNrefresh)
5134| [2751] Microsoft Word Macro Name Handling Overflow
5135| [2745] Microsoft HTML Help Control Privilege Escalation
5136| [2707] Microsoft IE Drag and Drop Arbitrary File Installation
5137| [2705] Microsoft Windows 2000 Windows Troubleshooter ActiveX Overflow
5138| [2692] Microsoft Windows Design Tools MDT2DD.DLL COM Object Memory Corruption Command Execution
5139| [2679] Microsoft Outlook Web Access XSS
5140| [2678] Microsoft Windows Overflow in ListBox and
5141| [2677] Microsoft Windows Arbitrary ActiveX Control Installation
5142| [2675] Microsoft Windows HCP protocol Overflow
5143| [2674] Microsoft Exchange SMTP Extended Request Overflow
5144| [2670] Microsoft Windows RPC Race Condition DoS
5145| [2657] Microsoft Windows Message Queuing Service Heap Overflow
5146| [2656] Hummingbird CyberDOCS on IIS Script Source Disclosure
5147| [2655] Microsoft Windows Server 2003 Shell Folders Arbitrary File Access
5148| [2642] Microsoft Windows Unauthorised Thread Termination
5149| [2592] Microsoft PowerPoint Modify Protection Bypass
5150| [2572] Microsoft BizTalk Server Insecure Permissions
5151| [2571] Microsoft Windows TCP Packet URG Value Information Disclosure
5152| [2544] Microsoft ASP.NET Request Validation Bypass
5153| [2540] Microsoft Windows 2003 Server Buffer Overflow Protection Mechanism Bypass
5154| [2535] Microsoft Windows DCOM RPCSS Service Filename Parameter Overflow
5155| [2510] Microsoft Access Snapshot Viewer Buffer Overflow
5156| [2508] Microsoft Visual Basic for Applications Buffer Overflow
5157| [2507] Microsoft Windows NetBIOS Random Memory Content Disclosure
5158| [2506] Microsoft Word/Works Automated Macro Execution
5159| [2453] Microsoft IE My Computer Zone Caching Issue
5160| [2451] Microsoft IE Object Data Header Type Safe File Execution
5161| [2423] Microsoft MCWNDX.OCX ActiveX Plugin Overflow
5162| [2368] IISShield Crafted HTTP Request Filtering Bypass
5163| [2329] Microsoft SQL Server Named Pipe Hijacking Local Privilege Escalation
5164| [2328] Microsoft Windows NT 4.0 with IBM JVM DoS
5165| [2320] Microsoft ISA Server HTTP Error Handler XSS
5166| [2306] Microsoft FrontPage Server Extensions SmartHTML Interpreter shtml.dll DoS
5167| [2299] Microsoft SQL Server Named Pipe Handling Request Remote DoS
5168| [2298] Microsoft ISA Server Error Page XSS
5169| [2291] Microsoft IE DOM Script Source Recursive DoS
5170| [2288] Microsoft Utility Manager Local Privilege Escalation
5171| [2283] Microsoft Exchange OWA Execute Arbitrary Code
5172| [2262] Microsoft Windows Media Player DHTML Local Zone Access
5173| [2247] Microsoft Windows Media Services Remote Command Execution #2
5174| [2244] Microsoft Windows 2000 ShellExecute() API Let
5175| [2239] Microsoft NetMeeting Arbitrary File Write/Execution
5176| [2237] Microsoft Windows 2000 Active Directory Lsass.exe Overflow
5177| [2100] Microsoft Windows RPC DCOM Interface Overflow
5178| [2096] Microsoft ISA Server SurfControl Web Filter
5179| [2074] Microsoft Windows Server Message Block (SMB) Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS
5180| [2073] Microsoft Windows XP Network Share Provider Overflow
5181| [2072] Microsoft Windows Network Connection Manager Privilege Elevation
5182| [2061] Microsoft Outlook HTML Mail Script Execution
5183| [2060] Microsoft IE Known Local File Script Execution
5184| [2051] Microsoft Windows User Shell Buffer Overflow
5185| [2049] Microsoft Commerce Server ISAPI Long Authentication Overflow
5186| [2047] Microsoft IE Content-Type Field Arbitrary File Execution
5187| [2046] Microsoft IE Forced Script Execution
5188| [2045] Microsoft IE HTML Document Directive Overflow
5189| [2043] Microsoft Telnet Server Protocol Option Handling Remote Overflow
5190| [2042] Microsoft Exchange System Attendant WinReg Remote Registry Key Manipulation
5191| [2041] Microsoft Office for Macintosh Network PID Checker DoS
5192| [2037] Microsoft Windows Trusted Domain SID Remote Privilege Escalation
5193| [2010] Microsoft SQL Server C Runtime Functions Format String DoS
5194| [2008] Microsoft IE Same Origin Policy Violation
5195| [2004] Microsoft IE Cross-frame Remote File Access
5196| [1995] Microsoft IE Download Dialog File Extension Spoofing Weakness
5197| [1992] Microsoft IE Cookie Disclosure
5198| [1990] Microsoft Windows Terminal Services False IP Address
5199| [1982] Microsoft IE about: URI XSS
5200| [1978] Microsoft IE for Mac OS Download Execution
5201| [1975] Microsoft Windows Terminal Server Service RDP Remote DoS
5202| [1972] Microsoft IE HTTP Request Encoding Spoofing Weakness
5203| [1971] Microsoft IE Dotless IP Zone Spoofing Weakness
5204| [1968] Microsoft Excel/PowerPoint Macro Security Bypass
5205| [1957] Microsoft Exchange OWA Malformed Request DoS
5206| [1949] Symantec Norton Anti-Virus for Microsoft Exchange 2000 INBOX Path Information Disclosure
5207| [1934] Microsoft ISA Server Invalid URL Error Message XSS
5208| [1933] Microsoft ISA Server Proxy Service Memory Leak DoS
5209| [1932] Microsoft ISA Server H.323 Memory Leak DoS
5210| [1928] Microsoft Windows NNTP Malformed Post DoS
5211| [1915] Microsoft Windows Media Player .NSC File Overflow
5212| [1912] Microsoft Windows Terminal Server Malformed RDP DoS
5213| [1902] Microsoft Outlook View ActiveX Arbitrary Command Execution
5214| [1867] Microsoft Word Document Macro Execution
5215| [1864] Microsoft SQL Server Administrator Cached Connection
5216| [1861] Microsoft Windows Telnet Local System Call DoS
5217| [1860] Microsoft Windows Telnet Service Handle Leak DoS
5218| [1859] Microsoft Windows Telnet Multiple Sessions DoS
5219| [1858] Microsoft Windows Telnet Service Logon Backspace DoS
5220| [1856] Microsoft Exchange OWA Embedded Script Execution
5221| [1852] Microsoft Outlook Address Book Spoofing Weakness
5222| [1840] Microsoft Windows Media Player Internet Shortcut Execution
5223| [1838] Microsoft Word .asd Macro File Execution
5224| [1837] Microsoft Word RTF Template Macro Execution
5225| [1832] Microsoft IE Spoofed SSL Certificates
5226| [1831] Microsoft IE Server Certificate Validation Failure
5227| [1820] Microsoft Index Server Search Parameter Overflow
5228| [1789] Microsoft ISA Server Web Proxy Malformed HTTP Request Parsing Remote DoS
5229| [1764] Microsoft Windows 2000 Domain Controller DoS
5230| [1758] Microsoft Windows 2000 Network DDE Escalated Privileges
5231| [1755] Microsoft Windows 2000 RDP Malformed Packet Handling Remote DoS
5232| [1735] Microsoft Windows NT SNMP WINS Database Deletion Remote DoS
5233| [1725] Microsoft Windows Media Player .WMZ Arbitrary Java Applet Execution
5234| [1724] Microsoft Web Client Extender NTLM Credential Disclosure
5235| [1685] Microsoft IE .lnk/.url Arbitrary Command Execution
5236| [1672] Microsoft Windows 2000 Telnet Session Timeout DoS
5237| [1658] Microsoft Windows Media Player .ASX File Handling Overflow
5238| [1656] Microsoft Windows Media Player .WMS Arbitrary Script Execution
5239| [1650] Microsoft Exchange Server EUSR_EXSTOREEVENT Default Account
5240| [1639] Microsoft Windows NT Terminal Server RegAPI.DLL Username Overflow
5241| [1633] Microsoft Windows 2000 System Monitor ActiveX LogFileName Parameter Validation Overflow
5242| [1621] Microsoft Indexing Services for Windows 2000 .htw XSS
5243| [1609] Microsoft NetMeeting Remote Desktop Sharing Malformed String Handling DoS
5244| [1607] Microsoft Windows 9x Invalid Driver Type DoS
5245| [1606] Microsoft IE Cached Web Credentials Disclosure
5246| [1599] Microsoft Windows 9x / Me IPX NMPI Packet DoS
5247| [1591] Microsoft Windows 2000 OEMPreinstall Installation Permission Weakness
5248| [1578] Microsoft Windows 2000 Simplified Chinese IME Local Privilege Escalation
5249| [1571] Microsoft Windows Media Player Malformed Embedded OCX Control DoS
5250| [1563] Microsoft Windows / Office DLL Search Path Weakness
5251| [1553] Microsoft WebTV annclist.exe Malformed UDP Packet Parsing Remote DoS
5252| [1546] Microsoft Windows Media Unicast Service Malformed Request DoS
5253| [1537] Microsoft Outlook Rich Text Format Information Disclosure
5254| [1530] Microsoft Money Cleartext Password Storage
5255| [1510] Microsoft IE Folder.htt Modification Privilege Escalation
5256| [1505] Microsoft Word Mail Merge Arbitrary Command Execution
5257| [1502] Microsoft IE Scriptlet Rendering
5258| [1500] Microsoft Word / Excel / Powerpoint 2000 Object Tag Buffer Overflow
5259| [1491] Microsoft Windows 9x IPX Ping Packet DoS
5260| [1475] Microsoft Outlook/Express Cache Bypass
5261| [1467] Microsoft Outlook/Express GMT Field Buffer Overflow
5262| [1464] Microsoft IE/Outlook DHTMLED / IFRAME Arbitrary File Access
5263| [1461] Microsoft Enterprise Manager DTS Package Password Disclosure
5264| [1455] Microsoft Excel REGISTER.ID Function Arbitrary Code Execution
5265| [1451] Microsoft SQL Server Stored Procedure Local Permission Restriction Bypass
5266| [1437] Microsoft Windows 2000 Telnet Server Binary Zero Parsing Remote DoS
5267| [1428] Microsoft IE/Office ActiveX Object Execution
5268| [1427] Microsoft IE VBA Code Execution
5269| [1399] Microsoft Windows 2000 Windows Station Access
5270| [1378] Microsoft IE SSL Certificates Validation Failure (v1)
5271| [1369] Microsoft SQL Server DTS Password Disclosure
5272| [1368] Microsoft Media Encoder Request Parsing Local DoS
5273| [1358] Microsoft Windows NT HostAnnouncement DoS
5274| [1342] Microsoft IE DocumentComplete() Cross Frame Access
5275| [1341] Microsoft IE ActiveX Combined Component Attributes
5276| [1328] Microsoft Office 2000 UA Control ActiveX (Ouactrl.ocx) Show Me Function Remote Code Execution
5277| [1326] Microsoft IE Crafted URL Cross Domain Cookie Disclosure
5278| [1308] Microsoft Windows NetBIOS NULL Source Name DoS
5279| [1297] Microsoft Windows 2000 Active Directory Object Attribute
5280| [1292] Microsoft Windows NT 4.0 / 2000 cmd.exe Buffer Overflow
5281| [1272] Microsoft Excel XLM Arbitrary Macro Execution
5282| [1268] Microsoft Windows TCP/IP Printing Service DoS
5283| [1257] Microsoft Windows Media License Manager DoS
5284| [1251] Microsoft Windows MS DOS Device Name DoS
5285| [1250] Microsoft SQL Server Non-Validated Query
5286| [1244] Microsoft Clip Art Buffer Overflow
5287| [1226] Microsoft Windows Media Server Malformed Handshake Sequence DoS
5288| [1214] Microsoft Windows NT Recycle Bin Deleted File Access
5289| [1209] Microsoft Terminal Server rdisk Registry Information Disclosure
5290| [1208] Microsoft East Asian Word Conversion Document Arbitrary Command Execution
5291| [1207] Microsoft SMS Remote Control Weak Permission Privilege Escalation
5292| [1199] Microsoft Windows NT NtImpersonateClientOfPort LPC Privilege Escalation
5293| [1188] Microsoft CIS IMAP Server Remote Overflow
5294| [1166] Microsoft Windows NT LsaLookupSids() DoS
5295| [1161] Microsoft Windows Help System File Manipulation Local Privilege Escalation
5296| [1156] Microsoft IE MSDXM.OCX vnd.ms.radio URL Handling Overflow
5297| [1152] Microsoft IE Web Proxy Auto-Discovery Unauthorized Proxy Reconfiguration
5298| [1146] Microsoft Windows 9x Credential Cache Cleartext Password Disclosure
5299| [1145] Microsoft IE Offline Browsing Pack Task Scheduler
5300| [1143] Microsoft SQL Server TDS Header NULL Data Handling Remote DoS
5301| [1139] Microsoft Rich Text Format (RTF) Reader Malformed Control Word Overflow
5302| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
5303| [1134] Microsoft Windows NT Print Spooler Malformed Request Overflow
5304| [1095] Microsoft Windows NT RPC Locator (RPCSS.EXE) CPU Utilization DoS
5305| [1076] Microsoft Windows IP Source Routing
5306| [1075] Microsoft Windows NT RASMAN Path Subversion Privilege Escalation
5307| [1069] Microsoft IE Import/Export Favorites
5308| [1056] Microsoft Java Virtual Machine Sandbox Bypass
5309| [1054] Microsoft IE scriptlet.typelib ActiveX Arbitrary Command Execution
5310| [1052] Microsoft Jet Database Text I-ISAM Arbitrary File Modification
5311| [1046] Microsoft Windows telnet.exe Argument Overflow
5312| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
5313| [1031] Microsoft Exchange Server Encapsulated SMTP Address Open Relay
5314| [1022] Microsoft Windows Invalid IGMP Header Handling Remote DoS
5315| [1019] Microsoft Taskpads Feature Arbitrary Script Injection
5316| [1013] Microsoft Windows NT Screensaver Context Local Privilege Escalation
5317| [1010] Microsoft Windows NT Malformed LSA Request DoS
5318| [967] Microsoft Windows NT WINS Service Malformed Data DoS
5319| [945] Microsoft Windows 95/98 SMB Authentication Replay
5320| [943] Microsoft Windows NT SP4 Null NT Hash Value Share Access
5321| [931] Microsoft Windows NT GINA Arbitrary Clipboard Content Disclosure
5322| [925] Microsoft Excel 97 CALL Arbitrary Command Execution
5323| [922] Microsoft NetMeeting Clipboard Remote Overflow
5324| [878] Microsoft SQL Resolution Service Keep-Alive Function DoS
5325| [868] Microsoft Windows Compressed Folders ZIP Decompression Arbitrary File Write
5326| [867] Microsoft Windows Compiled HTML Help (.chm) Arbitrary Command Execution
5327| [866] Microsoft Remote Data Protocol (RDP) Implementation Cryptographic Information Disclosure
5328| [864] Microsoft Windows Certificate Enrollment ActiveX Arbitrary Certificate Deletion
5329| [863] Microsoft Exchange Malformed Mail Attribute DoS
5330| [858] Microsoft Windows NCM Handler Local Privilege Elevation
5331| [852] Microsoft Exchange EHLO Long Hostname Overflow
5332| [837] Microsoft Windows RAS Phonebook dial-up String Overflow
5333| [831] Microsoft Site Server LDAP_Anonymous Account Default Password
5334| [788] Microsoft Windows smss.exe Handle Duplication Local Privilege Escalation
5335| [773] Microsoft Windows 2000 Group Policy File Lock DoS
5336| [772] Microsoft Windows Multiple UNC Provider Request Overflow
5337| [763] Microsoft IE VBScript Mis-Handling Arbitrary File Access
5338| [736] Microsoft Windows SMB Enumeration Information Disclosure
5339| [732] Microsoft Windows SMTP Service Malformed BDAT Request Remote DoS
5340| [715] Microsoft Windows NT LsaQueryInformationPolicy Function NULL Session Domain SID Enumeration
5341| [714] Microsoft Windows NT LsaQueryInformationPolicy() Function SID User Account Disclosure
5342| [697] Microsoft Windows Universal Plug and Play NOTIFY DoS
5343| [692] Microsoft Windows Universal Plug and Play NOTIFY Overflow
5344| [673] Microsoft Windows NT RPC Endpoint Mapper Malformed Request DoS
5345| [665] Microsoft Windows 95 Online Registration Information Disclosure
5346| [626] Microsoft Exchange OWA fumsg.asp Global Address List (GAL) Disclosure
5347| [608] Microsoft Windows IrDa Driver Malformed Packet Remote Overflow DoS
5348| [601] Microsoft Exchange Server LDAP Bind Function Overflow
5349| [581] Microsoft Windows SMTP Incorrect Credentials Authentication Bypass
5350| [572] Microsoft Windows NT NTLMSSP Crafted LPC Request Local Privilege Escalation
5351| [558] Microsoft SQL Server 0x02 Packet Remote Information Disclosure
5352| [553] Microsoft Index Server Malformed Search Arbitrary Server-side Include File Access
5353| [531] Microsoft SQL Server Registry Key Permission Weakness Privilege Escalation
5354| [516] Microsoft Point-to-Point Tunneling Protocol (PPTP) Encryption Weakness
5355| [515] Microsoft Windows 2000 LDAP Server Arbitrary User Password Modification
5356| [511] Microsoft Windows Malformed PPTP Packet Stream Remote DoS
5357| [499] Microsoft Windows NT Winsock2ProtocolCatalogMutex Mutex Local DoS
5358| [466] Microsoft Windows NT RAS Administration Registry Key Permission Weakness Local Privilege Escalation
5359| [457] Microsoft Exchange Malformed MIME Header DoS
5360| [454] Microsoft Windows 2000 NTLM Domain Account Lockout Policy Bypass
5361| [445] Microsoft Windows LAN Manager SNMP LanMan Information Disclosure
5362| [424] Microsoft Windows NT Malformed LPC Request Remote DoS
5363| [423] Microsoft Windows File Share Password Protection Bypass
5364| [418] Microsoft Windows telnet.exe NTLM Authentication Information Disclosure
5365| [408] Microsoft Windows Malformed DCE/RPC SMBwriteX Request DoS
5366| [403] Microsoft Windows 2000 Still Image Service WM_USER Message Local Overflow
5367| [398] Microsoft Windows 2000 Malformed RPC Traffic Local Security Policy Corruption DoS
5368| [396] Microsoft FrontPage shtml.exe MS-DOS Device Name Request DoS
5369| [385] Microsoft Windows Shell Executable (Explorer.exe) Registry Relative Path Privilege Escalation
5370| [336] Microsoft Windows CIFS Computer Browser ResetBrowser Frame DoS
5371| [335] Microsoft Windows Fragmented IP Packet Saturation DoS (jolt2)
5372| [334] Microsoft Windows Registry: Permission to Modify Common Paths
5373| [332] Microsoft Windows Registry Key Permission Weakness Admin Privilege Escalation
5374| [331] Microsoft Windows Remote Registry Access
5375| [316] Microsoft Windows NT Remote Registry Server WinLogon.exe Malformed Request Local DoS
5376| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
5377| [304] Microsoft Windows NT service pack level via remote registry access
5378| [303] Microsoft Windows NetBIOS Null Session Remote Registry Access
5379| [300] Microsoft Windows SMB LanMan Pipe Server Listing Disclosure
5380| [299] Microsoft Windows NetBIOS Shares Access Control Weakness
5381| [297] Microsoft Windows Installation ADMIN$ Share Arbitrary Access
5382| [282] Microsoft FrontPage dvwssr.dll Backdoor and Overflow
5383| [218] Microsoft Windows Multiple TCP/IP Stack Malformed Ping DoS
5384| [129] Microsoft Windows NT FTP 'guest' Account
5385| [111] Microsoft Personal Web Server Multiple Dot Request Arbitrary File Access
5386| [68] Microsoft FrontPage Extensions .pwd File Permissions
5387| [67] Microsoft FrontPage Extension shtml.dll Anonymous Account Information Disclosure
5388|_
5389Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5390OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
5391No OS matches for host
5392Network Distance: 10 hops
5393Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
5394
5395TRACEROUTE (using port 80/tcp)
5396HOP RTT ADDRESS
53971 255.43 ms 10.238.204.1
53982 255.47 ms 45.131.4.3
53993 255.47 ms 109.236.95.230
54004 255.50 ms 109.236.95.173
54015 255.51 ms ae3.amster51.ams.seabone.net (195.22.213.126)
54026 355.29 ms et1-1-2.istanbul1.ist.seabone.net (93.186.132.165)
54037 355.33 ms superonline.istanbul1.ist.seabone.net (93.186.132.155)
54048 ... 9
540510 156.04 ms 2.58.141.4
5406
5407NSE: Script Post-scanning.
5408Initiating NSE at 00:59
5409Completed NSE at 00:59, 0.00s elapsed
5410Initiating NSE at 00:59
5411Completed NSE at 00:59, 0.00s elapsed
5412Read data files from: /usr/bin/../share/nmap
5413OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
5414Nmap done: 1 IP address (1 host up) scanned in 256.29 seconds
5415 Raw packets sent: 157 (12.876KB) | Rcvd: 29 (2.003KB)
5416######################################################################################################################################
5417------------------------------------------------------------------------------------------------------------------------
5418
5419[ ! ] Starting SCANNER INURLBR 2.1 at [15-10-2019 00:59:42]
5420[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
5421It is the end user's responsibility to obey all applicable local, state and federal laws.
5422Developers assume no liability and are not responsible for any misuse or damage caused by this program
5423
5424[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.manisa.pol.tr/output/inurlbr-www.manisa.pol.tr ]
5425[ INFO ][ DORK ]::[ site:www.manisa.pol.tr ]
5426[ INFO ][ SEARCHING ]:: {
5427[ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.vi ]
5428
5429[ INFO ][ SEARCHING ]::
5430-[:::]
5431[ INFO ][ ENGINE ]::[ GOOGLE API ]
5432
5433[ INFO ][ SEARCHING ]::
5434-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
5435[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.py ID: 007843865286850066037:b0heuatvay8 ]
5436
5437[ INFO ][ SEARCHING ]::
5438-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
5439
5440[ INFO ][ TOTAL FOUND VALUES ]:: [ 41 ]
5441
5442
5443 _[ - ]::--------------------------------------------------------------------------------------------------------------
5444|_[ + ] [ 0 / 41 ]-[01:00:04] [ - ]
5445|_[ + ] Target:: [ http://www.manisa.pol.tr/ ]
5446|_[ + ] Exploit::
5447|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5448|_[ + ] More details:: / - / , ISP:
5449|_[ + ] Found:: UNIDENTIFIED
5450
5451 _[ - ]::--------------------------------------------------------------------------------------------------------------
5452|_[ + ] [ 1 / 41 ]-[01:00:07] [ - ]
5453|_[ + ] Target:: [ http://www.manisa.pol.tr/Duyurular/ ]
5454|_[ + ] Exploit::
5455|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5456|_[ + ] More details:: / - / , ISP:
5457|_[ + ] Found:: UNIDENTIFIED
5458
5459 _[ - ]::--------------------------------------------------------------------------------------------------------------
5460|_[ + ] [ 2 / 41 ]-[01:00:10] [ - ]
5461|_[ + ] Target:: [ http://www.manisa.pol.tr/Haberler ]
5462|_[ + ] Exploit::
5463|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5464|_[ + ] More details:: / - / , ISP:
5465|_[ + ] Found:: UNIDENTIFIED
5466
5467 _[ - ]::--------------------------------------------------------------------------------------------------------------
5468|_[ + ] [ 3 / 41 ]-[01:00:13] [ - ]
5469|_[ + ] Target:: [ http://www.manisa.pol.tr/yonet ]
5470|_[ + ] Exploit::
5471|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5472|_[ + ] More details:: / - / , ISP:
5473|_[ + ] Found:: UNIDENTIFIED
5474
5475 _[ - ]::--------------------------------------------------------------------------------------------------------------
5476|_[ + ] [ 4 / 41 ]-[01:00:16] [ - ]
5477|_[ + ] Target:: [ http://www.manisa.pol.tr/yoneticilerimiz ]
5478|_[ + ] Exploit::
5479|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5480|_[ + ] More details:: / - / , ISP:
5481|_[ + ] Found:: UNIDENTIFIED
5482
5483 _[ - ]::--------------------------------------------------------------------------------------------------------------
5484|_[ + ] [ 5 / 41 ]-[01:00:22] [ - ]
5485|_[ + ] Target:: [ http://www.manisa.pol.tr/arama ]
5486|_[ + ] Exploit::
5487|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5488|_[ + ] More details:: / - / , ISP:
5489|_[ + ] Found:: UNIDENTIFIED
5490
5491 _[ - ]::--------------------------------------------------------------------------------------------------------------
5492|_[ + ] [ 6 / 41 ]-[01:00:26] [ - ]
5493|_[ + ] Target:: [ http://www.manisa.pol.tr/haber22 ]
5494|_[ + ] Exploit::
5495|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5496|_[ + ] More details:: / - / , ISP:
5497|_[ + ] Found:: UNIDENTIFIED
5498
5499 _[ - ]::--------------------------------------------------------------------------------------------------------------
5500|_[ + ] [ 7 / 41 ]-[01:00:29] [ - ]
5501|_[ + ] Target:: [ http://www.manisa.pol.tr/bilgi-edinme ]
5502|_[ + ] Exploit::
5503|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5504|_[ + ] More details:: / - / , ISP:
5505|_[ + ] Found:: UNIDENTIFIED
5506
5507 _[ - ]::--------------------------------------------------------------------------------------------------------------
5508|_[ + ] [ 8 / 41 ]-[01:00:33] [ - ]
5509|_[ + ] Target:: [ http://www.manisa.pol.tr/valilik-karari7 ]
5510|_[ + ] Exploit::
5511|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5512|_[ + ] More details:: / - / , ISP:
5513|_[ + ] Found:: UNIDENTIFIED
5514
5515 _[ - ]::--------------------------------------------------------------------------------------------------------------
5516|_[ + ] [ 9 / 41 ]-[01:00:34] [ - ]
5517|_[ + ] Target:: [ http://www.manisa.pol.tr/alasehir/Haberler/ ]
5518|_[ + ] Exploit::
5519|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5520|_[ + ] More details:: / - / , ISP:
5521|_[ + ] Found:: UNIDENTIFIED
5522
5523 _[ - ]::--------------------------------------------------------------------------------------------------------------
5524|_[ + ] [ 10 / 41 ]-[01:00:37] [ - ]
5525|_[ + ] Target:: [ http://www.manisa.pol.tr/iletisim-bilgileri ]
5526|_[ + ] Exploit::
5527|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5528|_[ + ] More details:: / - / , ISP:
5529|_[ + ] Found:: UNIDENTIFIED
5530
5531 _[ - ]::--------------------------------------------------------------------------------------------------------------
5532|_[ + ] [ 11 / 41 ]-[01:00:41] [ - ]
5533|_[ + ] Target:: [ http://www.manisa.pol.tr/kamu-hizmetleri ]
5534|_[ + ] Exploit::
5535|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5536|_[ + ] More details:: / - / , ISP:
5537|_[ + ] Found:: UNIDENTIFIED
5538
5539 _[ - ]::--------------------------------------------------------------------------------------------------------------
5540|_[ + ] [ 12 / 41 ]-[01:00:44] [ - ]
5541|_[ + ] Target:: [ http://www.manisa.pol.tr/imar-barisi47 ]
5542|_[ + ] Exploit::
5543|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5544|_[ + ] More details:: / - / , ISP:
5545|_[ + ] Found:: UNIDENTIFIED
5546
5547 _[ - ]::--------------------------------------------------------------------------------------------------------------
5548|_[ + ] [ 13 / 41 ]-[01:00:49] [ - ]
5549|_[ + ] Target:: [ http://www.manisa.pol.tr/iletisim-yoluyla-dolandiricilik ]
5550|_[ + ] Exploit::
5551|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5552|_[ + ] More details:: / - / , ISP:
5553|_[ + ] Found:: UNIDENTIFIED
5554
5555 _[ - ]::--------------------------------------------------------------------------------------------------------------
5556|_[ + ] [ 14 / 41 ]-[01:00:51] [ - ]
5557|_[ + ] Target:: [ http://www.manisa.pol.tr/Sayfalar/BasindaBugun.aspx ]
5558|_[ + ] Exploit::
5559|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5560|_[ + ] More details:: / - / , ISP:
5561|_[ + ] Found:: UNIDENTIFIED
5562
5563 _[ - ]::--------------------------------------------------------------------------------------------------------------
5564|_[ + ] [ 15 / 41 ]-[01:00:57] [ - ]
5565|_[ + ] Target:: [ http://www.manisa.pol.tr/kolluk-etik-ilkeleri ]
5566|_[ + ] Exploit::
5567|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5568|_[ + ] More details:: / - / , ISP:
5569|_[ + ] Found:: UNIDENTIFIED
5570
5571 _[ - ]::--------------------------------------------------------------------------------------------------------------
5572|_[ + ] [ 16 / 41 ]-[01:01:03] [ - ]
5573|_[ + ] Target:: [ http://www.manisa.pol.tr/ilce-emniyet-mudurlukleri ]
5574|_[ + ] Exploit::
5575|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5576|_[ + ] More details:: / - / , ISP:
5577|_[ + ] Found:: UNIDENTIFIED
5578
5579 _[ - ]::--------------------------------------------------------------------------------------------------------------
5580|_[ + ] [ 17 / 41 ]-[01:01:08] [ - ]
5581|_[ + ] Target:: [ https://www.manisa.pol.tr/Sayfalar/annebaba.aspx ]
5582|_[ + ] Exploit::
5583|_[ + ] Information Server:: , , IP::0
5584|_[ + ] More details::
5585|_[ + ] Found:: UNIDENTIFIED
5586
5587 _[ - ]::--------------------------------------------------------------------------------------------------------------
5588|_[ + ] [ 18 / 41 ]-[01:01:11] [ - ]
5589|_[ + ] Target:: [ http://www.manisa.pol.tr/pasaport-sube-mudurlugu21 ]
5590|_[ + ] Exploit::
5591|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5592|_[ + ] More details:: / - / , ISP:
5593|_[ + ] Found:: UNIDENTIFIED
5594
5595 _[ - ]::--------------------------------------------------------------------------------------------------------------
5596|_[ + ] [ 19 / 41 ]-[01:01:12] [ - ]
5597|_[ + ] Target:: [ http://www.manisa.pol.tr/Sayfalar/SiteyeIliskinGorusOneri.aspx ]
5598|_[ + ] Exploit::
5599|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5600|_[ + ] More details:: / - / , ISP:
5601|_[ + ] Found:: UNIDENTIFIED
5602
5603 _[ - ]::--------------------------------------------------------------------------------------------------------------
5604|_[ + ] [ 20 / 41 ]-[01:01:14] [ - ]
5605|_[ + ] Target:: [ http://www.manisa.pol.tr/Sayfalar/Bilgilerinize.aspx ]
5606|_[ + ] Exploit::
5607|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5608|_[ + ] More details:: / - / , ISP:
5609|_[ + ] Found:: UNIDENTIFIED
5610
5611 _[ - ]::--------------------------------------------------------------------------------------------------------------
5612|_[ + ] [ 21 / 41 ]-[01:01:16] [ - ]
5613|_[ + ] Target:: [ http://www.manisa.pol.tr/Sayfalar/Teskilatimiz.aspx ]
5614|_[ + ] Exploit::
5615|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5616|_[ + ] More details:: / - / , ISP:
5617|_[ + ] Found:: UNIDENTIFIED
5618
5619 _[ - ]::--------------------------------------------------------------------------------------------------------------
5620|_[ + ] [ 22 / 41 ]-[01:01:22] [ - ]
5621|_[ + ] Target:: [ http://www.manisa.pol.tr/egm-internet-sitemiz-yenilendi ]
5622|_[ + ] Exploit::
5623|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5624|_[ + ] More details:: / - / , ISP:
5625|_[ + ] Found:: UNIDENTIFIED
5626
5627 _[ - ]::--------------------------------------------------------------------------------------------------------------
5628|_[ + ] [ 23 / 41 ]-[01:01:27] [ - ]
5629|_[ + ] Target:: [ https://www.manisa.pol.tr/Ihaleler/Sayfalar/default.aspx ]
5630|_[ + ] Exploit::
5631|_[ + ] Information Server:: , , IP::0
5632|_[ + ] More details::
5633|_[ + ] Found:: UNIDENTIFIED
5634
5635 _[ - ]::--------------------------------------------------------------------------------------------------------------
5636|_[ + ] [ 24 / 41 ]-[01:01:33] [ - ]
5637|_[ + ] Target:: [ http://www.manisa.pol.tr/sifir-atik-basin-bulteni15 ]
5638|_[ + ] Exploit::
5639|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5640|_[ + ] More details:: / - / , ISP:
5641|_[ + ] Found:: UNIDENTIFIED
5642
5643 _[ - ]::--------------------------------------------------------------------------------------------------------------
5644|_[ + ] [ 25 / 41 ]-[01:01:35] [ - ]
5645|_[ + ] Target:: [ http://www.manisa.pol.tr/ahmetli/Duyurular/Sayfalar/default.aspx ]
5646|_[ + ] Exploit::
5647|_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5648|_[ + ] More details:: / - / , ISP:
5649|_[ + ] Found:: UNIDENTIFIED
5650
5651 _[ - ]::--------------------------------------------------------------------------------------------------------------
5652|_[ + ] [ 26 / 41 ]-[01:01:38] [ - ]
5653|_[ + ] Target:: [ http://www.manisa.pol.tr/yasam-icin-kisa-bir-mola ]
5654|_[ + ] Exploit::
5655|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5656|_[ + ] More details:: / - / , ISP:
5657|_[ + ] Found:: UNIDENTIFIED
5658
5659 _[ - ]::--------------------------------------------------------------------------------------------------------------
5660|_[ + ] [ 27 / 41 ]-[01:01:41] [ - ]
5661|_[ + ] Target:: [ http://www.manisa.pol.tr/bu-kemer-sana-cok-yakisir58 ]
5662|_[ + ] Exploit::
5663|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5664|_[ + ] More details:: / - / , ISP:
5665|_[ + ] Found:: UNIDENTIFIED
5666
5667 _[ - ]::--------------------------------------------------------------------------------------------------------------
5668|_[ + ] [ 28 / 41 ]-[01:01:44] [ - ]
5669|_[ + ] Target:: [ http://www.manisa.pol.tr/sporda-siddet-ve-duzensizligin-onlemesi36 ]
5670|_[ + ] Exploit::
5671|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5672|_[ + ] More details:: / - / , ISP:
5673|_[ + ] Found:: UNIDENTIFIED
5674
5675 _[ - ]::--------------------------------------------------------------------------------------------------------------
5676|_[ + ] [ 29 / 41 ]-[01:01:50] [ - ]
5677|_[ + ] Target:: [ http://www.manisa.pol.tr/vizyon-proje-maks-egm-merkezicerik ]
5678|_[ + ] Exploit::
5679|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5680|_[ + ] More details:: / - / , ISP:
5681|_[ + ] Found:: UNIDENTIFIED
5682
5683 _[ - ]::--------------------------------------------------------------------------------------------------------------
5684|_[ + ] [ 30 / 41 ]-[01:01:56] [ - ]
5685|_[ + ] Target:: [ http://www.manisa.pol.tr/alo-140-teror-ihbar-hatti23 ]
5686|_[ + ] Exploit::
5687|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5688|_[ + ] More details:: / - / , ISP:
5689|_[ + ] Found:: UNIDENTIFIED
5690
5691 _[ - ]::--------------------------------------------------------------------------------------------------------------
5692|_[ + ] [ 31 / 41 ]-[01:02:01] [ - ]
5693|_[ + ] Target:: [ http://www.manisa.pol.tr/ramazan-bayrami-trafik-tedbirleri-egm-merkezicerik ]
5694|_[ + ] Exploit::
5695|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5696|_[ + ] More details:: / - / , ISP:
5697|_[ + ] Found:: UNIDENTIFIED
5698
5699 _[ - ]::--------------------------------------------------------------------------------------------------------------
5700|_[ + ] [ 32 / 41 ]-[01:02:04] [ - ]
5701|_[ + ] Target:: [ http://www.manisa.pol.tr/il-emniyet-mudurumuz-sayin-omer-uslusoy ]
5702|_[ + ] Exploit::
5703|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5704|_[ + ] More details:: / - / , ISP:
5705|_[ + ] Found:: UNIDENTIFIED
5706
5707 _[ - ]::--------------------------------------------------------------------------------------------------------------
5708|_[ + ] [ 33 / 41 ]-[01:02:07] [ - ]
5709|_[ + ] Target:: [ http://www.manisa.pol.tr/yetkisiz-cakar-kullanimina-yasak-egm-merkezicerik ]
5710|_[ + ] Exploit::
5711|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5712|_[ + ] More details:: / - / , ISP:
5713|_[ + ] Found:: UNIDENTIFIED
5714
5715 _[ - ]::--------------------------------------------------------------------------------------------------------------
5716|_[ + ] [ 34 / 41 ]-[01:02:12] [ - ]
5717|_[ + ] Target:: [ https://www.manisa.pol.tr/search/_vti_bin/search.asmx?op=GetSearchMetadata ]
5718|_[ + ] Exploit::
5719|_[ + ] Information Server:: , , IP::0
5720|_[ + ] More details::
5721|_[ + ] Found:: UNIDENTIFIED
5722
5723 _[ - ]::--------------------------------------------------------------------------------------------------------------
5724|_[ + ] [ 35 / 41 ]-[01:02:18] [ - ]
5725|_[ + ] Target:: [ http://www.manisa.pol.tr/hedef-yolda-sifir-can-kaybi-egm-merkezicerik ]
5726|_[ + ] Exploit::
5727|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5728|_[ + ] More details:: / - / , ISP:
5729|_[ + ] Found:: UNIDENTIFIED
5730
5731 _[ - ]::--------------------------------------------------------------------------------------------------------------
5732|_[ + ] [ 36 / 41 ]-[01:02:24] [ - ]
5733|_[ + ] Target:: [ http://www.manisa.pol.tr/kurumlar/manisa.pol.tr/Arsiv/Sayfalar/Valilik_Karari.pdf ]
5734|_[ + ] Exploit::
5735|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5736|_[ + ] More details:: / - / , ISP:
5737|_[ + ] Found:: UNIDENTIFIED
5738
5739 _[ - ]::--------------------------------------------------------------------------------------------------------------
5740|_[ + ] [ 37 / 41 ]-[01:02:26] [ - ]
5741|_[ + ] Target:: [ http://www.manisa.pol.tr/yaya-onceligini-bir-de-gta-ile-ogreniyoruz-egm-merkezicerik ]
5742|_[ + ] Exploit::
5743|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5744|_[ + ] More details:: / - / , ISP:
5745|_[ + ] Found:: UNIDENTIFIED
5746
5747 _[ - ]::--------------------------------------------------------------------------------------------------------------
5748|_[ + ] [ 38 / 41 ]-[01:02:30] [ - ]
5749|_[ + ] Target:: [ http://www.manisa.pol.tr/ulke-genelinde-es-zamanli-olarak-gunubirlik-kiralanan-evlere-yonelik-denetlemeler-yapildi-58 ]
5750|_[ + ] Exploit::
5751|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5752|_[ + ] More details:: / - / , ISP:
5753|_[ + ] Found:: UNIDENTIFIED
5754
5755 _[ - ]::--------------------------------------------------------------------------------------------------------------
5756|_[ + ] [ 39 / 41 ]-[01:02:35] [ - ]
5757|_[ + ] Target:: [ http://www.manisa.pol.tr/696-sayili-khk-kapsaminda-taserondan-kadroya-gecirilecek-iscilere-yonelik-sozlu-sinav-sonucu31 ]
5758|_[ + ] Exploit::
5759|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5760|_[ + ] More details:: / - / , ISP:
5761|_[ + ] Found:: UNIDENTIFIED
5762
5763 _[ - ]::--------------------------------------------------------------------------------------------------------------
5764|_[ + ] [ 40 / 41 ]-[01:02:37] [ - ]
5765|_[ + ] Target:: [ http://www.manisa.pol.tr/gordes/_layouts/help.aspx?showNav=false ]
5766|_[ + ] Exploit::
5767|_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: Microsoft-IIS/10.0 X-Powered-By: ASP.NET, IP:2.58.141.4:80
5768|_[ + ] More details:: / - / , ISP:
5769|_[ + ] Found:: UNIDENTIFIED
5770
5771[ INFO ] [ Shutting down ]
5772[ INFO ] [ End of process INURLBR at [15-10-2019 01:02:37]
5773[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
5774[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.manisa.pol.tr/output/inurlbr-www.manisa.pol.tr ]
5775|_________________________________________________________________________________________
5776
5777\_________________________________________________________________________________________/
5778######################################################################################################################################
5779Hosts
5780=====
5781
5782address mac name os_name os_flavor os_sp purpose info comments
5783------- --- ---- ------- --------- ----- ------- ---- --------
57842.58.141.4 Unknown device
5785
5786Services
5787========
5788
5789host port proto name state info
5790---- ---- ----- ---- ----- ----
57912.58.141.4 53 udp domain unknown
57922.58.141.4 67 udp dhcps unknown
57932.58.141.4 68 udp dhcpc unknown
57942.58.141.4 69 udp tftp unknown
57952.58.141.4 80 tcp http open
57962.58.141.4 88 udp kerberos-sec unknown
57972.58.141.4 123 udp ntp unknown
57982.58.141.4 139 udp netbios-ssn unknown
57992.58.141.4 161 udp snmp unknown
58002.58.141.4 162 udp snmptrap unknown
58012.58.141.4 389 udp ldap unknown
58022.58.141.4 500 udp isakmp unknown
58032.58.141.4 520 udp route unknown
58042.58.141.4 2049 udp nfs unknown
5805######################################################################################################################################
5806Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-15 01:08 EDT
5807Nmap scan report for 2.58.141.4
5808Host is up (0.24s latency).
5809Not shown: 995 filtered ports, 4 closed ports
5810Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
5811PORT STATE SERVICE
581280/tcp open http
5813
5814Nmap done: 1 IP address (1 host up) scanned in 362.62 seconds
5815######################################################################################################################################
5816Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-15 01:14 EDT
5817Nmap scan report for 2.58.141.4
5818Host is up (0.24s latency).
5819Not shown: 2 filtered ports
5820PORT STATE SERVICE
582153/udp open|filtered domain
582267/udp open|filtered dhcps
582368/udp open|filtered dhcpc
582469/udp open|filtered tftp
582588/udp open|filtered kerberos-sec
5826123/udp open|filtered ntp
5827139/udp open|filtered netbios-ssn
5828161/udp open|filtered snmp
5829162/udp open|filtered snmptrap
5830389/udp open|filtered ldap
5831500/udp open|filtered isakmp
5832520/udp open|filtered route
58332049/udp open|filtered nfs
5834
5835Nmap done: 1 IP address (1 host up) scanned in 5.19 seconds
5836#######################################################################################################################################
5837HTTP/1.1 302 Found
5838Cache-Control: private, no-store, max-age=180
5839Content-Length: 123
5840Content-Type: text/html; charset=utf-8
5841Expires: Tue, 15 Oct 2019 05:17:23 GMT
5842Last-Modified: Tue, 15 Oct 2019 05:14:23 GMT
5843Location: /Login
5844Vary: *
5845Server: Microsoft-IIS/10.0
5846Set-Cookie: ASP.NET_SessionId=zg4aqdrs3xay232ak2fhealq; path=/; HttpOnly
5847X-AspNetMvc-Version: 5.2
5848X-AspNet-Version: 4.0.30319
5849X-Powered-By: ASP.NET
5850Date: Tue, 15 Oct 2019 05:14:23 GMT
5851Set-Cookie: NSC_ESNS=7d843c58-559d-1da5-9678-ba8b1843e7c4_3348015806_1151565835_00000000014990201085; Path=/; Expires=Tue, 15-Oct-2019 05:14:38 GMT
5852
5853Allow: OPTIONS, TRACE, GET, HEAD, POST
5854######################################################################################################################################
5855http://2.58.141.4 [302 Found] ASP_NET[4.0.30319][MVC5.2], Citrix-NetScaler, Cookies[ASP.NET_SessionId,NSC_ESNS], Country[UKRAINE][UA], HTTPServer[Microsoft-IIS/10.0], HttpOnly[ASP.NET_SessionId], IP[2.58.141.4], Microsoft-IIS[10.0], RedirectLocation[/Login], Title[Object moved], UncommonHeaders[x-aspnetmvc-version], X-Powered-By[ASP.NET]
5856http://2.58.141.4/Login [302 Found] ASP_NET[4.0.30319][MVC5.2], Citrix-NetScaler, Cookies[ASP.NET_SessionId,NSC_ESNS], Country[UKRAINE][UA], HTTPServer[Microsoft-IIS/10.0], HttpOnly[ASP.NET_SessionId], IP[2.58.141.4], Microsoft-IIS[10.0], RedirectLocation[/Login/Ev/Giris], Title[Object moved], UncommonHeaders[x-aspnetmvc-version], X-Powered-By[ASP.NET]
5857http://2.58.141.4/Login/Ev/Giris [302 Found] ASP_NET[4.0.30319][MVC5.2], Citrix-NetScaler, Cookies[ASP.NET_SessionId,NSC_ESNS], Country[UKRAINE][UA], HTTPServer[Microsoft-IIS/10.0], HttpOnly[ASP.NET_SessionId], IP[2.58.141.4], Microsoft-IIS[10.0], RedirectLocation[/Login/Ev/Giris], Title[Object moved], UncommonHeaders[x-aspnetmvc-version], X-Powered-By[ASP.NET]
5858#######################################################################################################################################
5859Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-15 01:14 EDT
5860NSE: Loaded 163 scripts for scanning.
5861NSE: Script Pre-scanning.
5862Initiating NSE at 01:14
5863Completed NSE at 01:14, 0.00s elapsed
5864Initiating NSE at 01:14
5865Completed NSE at 01:14, 0.00s elapsed
5866Initiating Parallel DNS resolution of 1 host. at 01:14
5867Completed Parallel DNS resolution of 1 host. at 01:14, 0.02s elapsed
5868Initiating SYN Stealth Scan at 01:14
5869Scanning 2.58.141.4 [1 port]
5870Discovered open port 80/tcp on 2.58.141.4
5871Completed SYN Stealth Scan at 01:14, 0.27s elapsed (1 total ports)
5872Initiating Service scan at 01:14
5873Scanning 1 service on 2.58.141.4
5874Completed Service scan at 01:15, 6.47s elapsed (1 service on 1 host)
5875Initiating OS detection (try #1) against 2.58.141.4
5876Retrying OS detection (try #2) against 2.58.141.4
5877Initiating Traceroute at 01:15
5878Completed Traceroute at 01:15, 3.00s elapsed
5879Initiating Parallel DNS resolution of 8 hosts. at 01:15
5880Completed Parallel DNS resolution of 8 hosts. at 01:15, 0.79s elapsed
5881NSE: Script scanning 2.58.141.4.
5882Initiating NSE at 01:15
5883Completed NSE at 01:17, 119.66s elapsed
5884Initiating NSE at 01:17
5885Completed NSE at 01:17, 1.46s elapsed
5886Nmap scan report for 2.58.141.4
5887Host is up (0.25s latency).
5888
5889PORT STATE SERVICE VERSION
589080/tcp open http Microsoft IIS httpd 10.0
5891| http-brute:
5892|_ Path "/" does not require authentication
5893|_http-chrono: Request times for /; avg: 1417.50ms; min: 404.14ms; max: 3989.42ms
5894|_http-csrf: Couldn't find any CSRF vulnerabilities.
5895|_http-date: Tue, 15 Oct 2019 05:15:55 GMT; -1s from local time.
5896|_http-devframework: ASP.NET detected. Found related header.
5897|_http-dombased-xss: Couldn't find any DOM based XSS.
5898|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
5899|_http-errors: Couldn't find any error pages.
5900|_http-feed: Couldn't find any feeds.
5901|_http-fetch: Please enter the complete path of the directory to save data in.
5902| http-headers:
5903| Cache-Control: public, no-cache="Set-Cookie", max-age=600
5904| Content-Type: text/html; charset=utf-8
5905| Expires: Tue, 15 Oct 2019 05:25:55 GMT
5906| Last-Modified: Tue, 15 Oct 2019 05:15:55 GMT
5907| Location: /Login/Ev/Giris
5908| Vary: *
5909| Server: Microsoft-IIS/10.0
5910| Set-Cookie: ASP.NET_SessionId=dvdak3zzztkuoymd2uxl3hda; path=/; HttpOnly
5911| X-AspNetMvc-Version: 5.2
5912| X-AspNet-Version: 4.0.30319
5913| X-Powered-By: ASP.NET
5914| Date: Tue, 15 Oct 2019 05:15:55 GMT
5915| Content-Length: 132
5916| Set-Cookie: NSC_ESNS=7d7f7fe3-55f9-1da5-9678-ba8b1843e7c4_0667723685_2766245001_00000000014990231695; Path=/; Expires=Tue, 15-Oct-2019 05:16:10 GMT
5917|
5918|_ (Request type: GET)
5919|_http-jsonp-detection: Couldn't find any JSONP endpoints.
5920| http-methods:
5921| Supported Methods: OPTIONS TRACE GET HEAD POST
5922|_ Potentially risky methods: TRACE
5923|_http-mobileversion-checker: No mobile version detected.
5924| http-robots.txt: 5 disallowed entries
5925| /kullanicilar /ortak_icerik /kurumlar /Kurumlar
5926|_/Kullanicilar
5927| http-security-headers:
5928| Cache_Control:
5929| Header: Cache-Control: public, no-cache="Set-Cookie", max-age=600
5930| Expires:
5931|_ Header: Expires: Tue, 15 Oct 2019 05:25:35 GMT
5932|_http-server-header: Microsoft-IIS/10.0
5933| http-sitemap-generator:
5934| Directory structure:
5935| Longest directory structure:
5936| Depth: 0
5937| Dir: /
5938| Total files found (by extension):
5939|_
5940|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
5941|_http-title: Did not follow redirect to /Login/Ev/Giris
5942| http-traceroute:
5943| last-modified
5944| Hop #1: Tue, 15 Oct 2019 05:15:26 GMT
5945| Hop #2: Tue, 15 Oct 2019 05:15:26 GMT
5946|_ Hop #3: Tue, 15 Oct 2019 05:15:27 GMT
5947| http-vhosts:
5948|_127 names had status 302
5949| http-waf-detect: IDS/IPS/WAF detected:
5950|_2.58.141.4:80/?p4yl04d3=<script>alert(document.cookie)</script>
5951| http-waf-fingerprint:
5952| Detected WAF
5953|_ Citrix Netscaler
5954|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
5955|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
5956|_http-xssed: No previously reported XSS vuln.
5957| vulscan: VulDB - https://vuldb.com:
5958| [8603] Microsoft Internet Explorer up to 10.0.9200.16540 XMLDOM information disclosure
5959| [40004] Microsoft DirectX up to 10.0 DirectShow quartz.dll memory corruption
5960| [33889] Microsoft Windows Media Player 10.00.00.4036 denial of service
5961| [139953] Microsoft Internet Explorer 10/11 memory corruption
5962| [139951] Microsoft Internet Explorer 10/11 Security Feature memory corruption
5963| [139935] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 NTFS privilege escalation
5964| [139912] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Hyper-V Network Switch denial of service
5965| [136321] Microsoft Windows 10 1809/10 1903/Server 1903/Server 2019 Audio Service privilege escalation
5966| [136279] Microsoft Internet Explorer 10/11 memory corruption
5967| [136275] Microsoft Windows 10/10 1607/10 1703/10 1709/Server 2016 Hyper-V memory corruption
5968| [136265] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
5969| [134682] Microsoft Internet Explorer 10/11 memory corruption
5970| [134675] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
5971| [133225] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
5972| [133210] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 DirectX information disclosure
5973| [133208] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
5974| [133178] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
5975| [133161] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
5976| [131680] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
5977| [131678] Microsoft Internet Explorer 10/11 memory corruption
5978| [131664] Microsoft Internet Explorer 10/11 Security Feature Security Zone privilege escalation
5979| [131650] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V denial of service
5980| [131639] Microsoft Internet Explorer 10/11 VBScript Engine memory corruption
5981| [131632] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
5982| [131631] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
5983| [131630] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DHCP Client memory corruption
5984| [131618] Microsoft Internet Explorer 10/11 memory corruption
5985| [130827] Microsoft Internet Explorer 10/11 information disclosure
5986| [128722] Microsoft Windows 10 1803/Server 1803 DHCP Client memory corruption
5987| [128717] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Hyper-V memory corruption
5988| [127881] Microsoft Windows 10 1809/Server 2019 Object denial of service
5989| [127827] Microsoft Windows 10 1809/Server 2019 DirectX information disclosure
5990| [127826] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 Win32k ASLR privilege escalation
5991| [126733] Microsoft Windows 10 1803/10 1809/Server 1803/Server 2019 DirectX memory corruption
5992| [125112] Microsoft Windows 10 1803/Server 1803 Subsystem for Linux memory corruption
5993| [123867] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
5994| [123866] Microsoft Windows 10 1803/Server 1803 Hyper-V denial of service
5995| [123848] Microsoft Internet Explorer 10/11 Scripting Engine information disclosure
5996| [123834] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
5997| [122888] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Windows Shell privilege escalation
5998| [122862] Microsoft Internet Explorer 10/11 Cross-Frame information disclosure
5999| [122853] Microsoft Internet Explorer 10/11 Hyperlink privilege escalation
6000| [122846] Microsoft Internet Explorer 10/11 memory corruption
6001| [122826] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 PDF memory corruption
6002| [121102] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
6003| [119471] Microsoft Windows 10 1803/Server 1803 Win32k privilege escalation
6004| [119466] Microsoft Windows 10 1709/Server 1709 Hyper-V denial of service
6005| [119453] Microsoft Windows 10 1709/10 1803/Server 1709/Server 1803 WebDAV denial of service
6006| [119450] Microsoft Windows 10 1703/10 1709/10 1803/Server 1709/Server 1803 Kernel information disclosure
6007| [117496] Microsoft Internet Explorer 10/11 Chakra Scripting Engine information disclosure
6008| [116020] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Active Directory privilege escalation
6009| [115997] Microsoft Internet Explorer 10/11 memory corruption
6010| [116937] Microsoft Internet Explorer 10/11 Code Execution memory corruption
6011| [114567] Microsoft Internet Explorer 10/11 information disclosure
6012| [114565] Microsoft Windows 10 1607/10 1703/10 1709/Server 1709/Server 2016 Kernel information disclosure
6013| [114534] Microsoft Windows 10/10 1511/10 1607/10 1703/10 1709 Scripting Host privilege escalation
6014| [114522] Microsoft Windows 10 1607/10 1703/Server 2016 Desktop Bridge privilege escalation
6015| [114520] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge privilege escalation
6016| [114517] Microsoft Windows 10/Server 1709/Server 2016 Desktop Bridge VFS privilege escalation
6017| [113262] Microsoft Windows 10/Server 1709 Storage Services memory corruption
6018| [113261] Microsoft Windows 10/Server 1709 Security Feature privilege escalation
6019| [113259] Microsoft Windows 10/Server 1709/Server 2016 NTFS privilege escalation
6020| [113258] Microsoft Windows 10/Server 1709 Kernel information disclosure
6021| [113253] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
6022| [113251] Microsoft Windows 10/Server 1709 Kernel memory corruption
6023| [113250] Microsoft Windows 10/Server 1709/Server 2016 Kernel memory corruption
6024| [113243] Microsoft Windows 10/Server 2016 MultiPoint Management privilege escalation
6025| [113240] Microsoft Windows 10/Server 1709/Server 2016 AppContainer privilege escalation
6026| [113238] Microsoft Windows 10 1709/Server 1709 Named Pipe File System privilege escalation
6027| [113221] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
6028| [110532] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
6029| [110531] Microsoft Windows 10/Server 2016 Device Guard privilege escalation
6030| [109365] Microsoft Internet Explorer 10/11 memory corruption
6031| [107753] Microsoft Windows 10/Server 2016 SMB privilege escalation
6032| [107734] Microsoft Windows 10/Server 2016 SMB privilege escalation
6033| [105049] Microsoft Windows 10 1703 Remote Desktop Protocol denial of service
6034| [105013] Microsoft Windows 10 1607/10 1703/Server 2016 Hyper-V denial of service
6035| [103442] Microsoft Windows 10/Server 2016 HoloLens WiFi Packet privilege escalation
6036| [102461] Microsoft Internet Explorer 10/11 memory corruption
6037| [101028] Microsoft Windows 10/Server 2016 Hyper-V vSMB privilege escalation
6038| [101007] Microsoft Internet Explorer 10/11 memory corruption
6039| [99683] Microsoft Windows 10 1607/10 1703/Server 2012 R2/Server 2016 Active Directory Lockout privilege escalation
6040| [99667] Microsoft Windows 10/Server 2016 Active Directory Service Unresponsive denial of service
6041| [98272] Microsoft Windows up to 10/Server 2016 Local Session privilege escalation
6042| [98015] Microsoft Windows 10/Server 2016 Hyper-V denial of service
6043| [98013] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
6044| [98007] Microsoft Windows 10/Server 2016 Hyper-V Network Switch denial of service
6045| [98006] Microsoft Windows 10/Server 2016 Hyper-V vSMB memory corruption
6046| [97967] Microsoft Internet Explorer 10/11 memory corruption
6047| [97965] Microsoft Internet Explorer 10/11 memory corruption
6048| [94436] Microsoft Windows 10 Graphics memory corruption
6049| [94421] Microsoft Internet Explorer 10/11 information disclosure
6050| [94418] Microsoft Internet Explorer 10/11 privilege escalation
6051| [93427] Microsoft Internet Explorer 10/11 memory corruption
6052| [93266] Microsoft Internet Explorer 10 MSHTML GetPlainTextInScope memory corruption
6053| [92595] Microsoft Windows 10 Diagnostics Hub privilege escalation
6054| [92561] Microsoft Internet Explorer 10/11 privilege escalation
6055| [92560] Microsoft Internet Explorer 10/11 privilege escalation
6056| [92557] Microsoft Internet Explorer 10/11 memory corruption
6057| [91560] Microsoft Windows 10 Object denial of service
6058| [91517] Microsoft Internet Explorer 10/11 memory corruption
6059| [91516] Microsoft Internet Explorer 10/11 privilege escalation
6060| [90712] Microsoft Windows 10/10 1511 Universal Outlook information disclosure
6061| [90683] Microsoft Internet Explorer 10/11 information disclosure
6062| [89020] Microsoft Internet Explorer 10/11 information disclosure
6063| [89010] Microsoft Internet Explorer 10/11 memory corruption
6064| [87964] Microsoft Internet Explorer 10/11 Scripting Engine memory corruption
6065| [87952] Microsoft Windows 10/10 1511 Diagnostic Hub privilege escalation
6066| [87946] Microsoft Windows 10 Kernel win32k.sys privilege escalation
6067| [87139] Microsoft Internet Explorer 10/11 information disclosure
6068| [82246] Microsoft Internet Explorer 10/11 memory corruption
6069| [82234] Microsoft Windows 10 HTTP.sys HTTP Request denial of service
6070| [81271] Microsoft Windows 10 PDF Library memory corruption
6071| [81249] Microsoft Internet Explorer 10/11 memory corruption
6072| [81243] Microsoft Internet Explorer 10 memory corruption
6073| [80845] Microsoft Internet Explorer 10 memory corruption
6074| [80843] Microsoft Internet Explorer 10 memory corruption
6075| [80839] Microsoft Internet Explorer 10/11 DLL Loader memory corruption
6076| [80229] Microsoft Exchange Server 2013 CU 10/2013 CU 11/2013 SP1/2016 Outlook Web Access cross site scripting
6077| [80227] Microsoft Exchange Server 2013 CU 10/2013 SP1/2016 Outlook Web Access cross site scripting
6078| [80223] Microsoft Windows 10/1511 RDP Service weak authentication
6079| [79515] Microsoft Windows 10 Kernel memory corruption
6080| [79473] Microsoft Internet Explorer 10 memory corruption
6081| [79466] Microsoft Internet Explorer 10/11 memory corruption
6082| [79463] Microsoft Internet Explorer 10 memory corruption
6083| [79158] Microsoft Internet Explorer 10/11 memory corruption
6084| [79157] Microsoft Internet Explorer 10/11 memory corruption
6085| [79139] Microsoft Internet Explorer 10/11 memory corruption
6086| [78383] Microsoft Internet Explorer 10/11 privilege escalation
6087| [78382] Microsoft Internet Explorer 10 memory corruption
6088| [77643] Microsoft Internet Explorer 10/11 memory corruption
6089| [77597] Microsoft Internet Explorer 10/11 File denial of service
6090| [77596] Microsoft Internet Explorer 10/11 Process information disclosure
6091| [77007] Microsoft Internet Explorer 10 ASLR privilege escalation
6092| [77005] Microsoft Internet Explorer 10/11 memory corruption
6093| [76494] Microsoft Internet Explorer 10/11 JScript 9 memory corruption
6094| [76488] Microsoft Internet Explorer 10/11 File information disclosure
6095| [76487] Microsoft Internet Explorer 10/11 memory corruption
6096| [76475] Microsoft Internet Explorer 10/11 memory corruption
6097| [76436] Microsoft Internet Explorer 10/11 memory corruption
6098| [75781] Microsoft Internet Explorer 10/11 memory corruption
6099| [75777] Microsoft Internet Explorer 10 memory corruption
6100| [75767] Microsoft Internet Explorer 10/11 privilege escalation
6101| [75766] Microsoft Internet Explorer 10/11 memory corruption
6102| [75765] Microsoft Internet Explorer 10/11 memory corruption
6103| [75762] Microsoft Internet Explorer 10/11 memory corruption
6104| [75760] Microsoft Windows Media Player 10/11/12 DataObject memory corruption
6105| [75399] Trend Micro ScanMail for Microsoft Exchange up to 10.2/11.0 Session ID Generator weak authentication
6106| [75324] Microsoft Internet Explorer 10/11 memory corruption
6107| [74857] Microsoft Internet Explorer 10/11 memory corruption
6108| [73944] Microsoft Internet Explorer 10/11 memory corruption
6109| [73942] Microsoft Internet Explorer 10 memory corruption
6110| [69145] Microsoft Internet Explorer 10/11 ASLR privilege escalation
6111| [69144] Microsoft Internet Explorer 10/11 memory corruption
6112| [69141] Microsoft Internet Explorer 10/11 privilege escalation
6113| [69138] Microsoft Internet Explorer 10/11 memory corruption
6114| [69126] Microsoft Internet Explorer 10/11 memory corruption
6115| [69122] Microsoft Internet Explorer 10/11 memory corruption
6116| [69117] Microsoft Internet Explorer 10/11 memory corruption
6117| [69115] Microsoft Internet Explorer 10 memory corruption
6118| [69114] Microsoft Internet Explorer 10 memory corruption
6119| [68398] Microsoft Internet Explorer 10 memory corruption
6120| [68180] Microsoft Internet Explorer 10/11 privilege escalation
6121| [68179] Microsoft Internet Explorer 10/11 privilege escalation
6122| [68168] Microsoft Internet Explorer 10/11 memory corruption
6123| [67810] Microsoft Internet Explorer 10/11 memory corruption
6124| [67504] Microsoft Internet Explorer 10/11 memory corruption
6125| [67495] Microsoft Internet Explorer 10 memory corruption
6126| [67493] Microsoft Internet Explorer 10/11 memory corruption
6127| [67491] Microsoft Internet Explorer 10/11 memory corruption
6128| [67486] Microsoft Internet Explorer 10 memory corruption
6129| [67482] Microsoft Internet Explorer 10/11 memory corruption
6130| [67352] Microsoft Internet Explorer 10/11 memory corruption
6131| [67347] Microsoft Internet Explorer 10/11 memory corruption
6132| [67344] Microsoft Internet Explorer 10/11 memory corruption
6133| [67341] Microsoft Internet Explorer 10/11 memory corruption
6134| [67334] Microsoft Internet Explorer 10 memory corruption
6135| [67330] Microsoft Internet Explorer 10/11 memory corruption
6136| [67329] Microsoft Internet Explorer 10/11 memory corruption
6137| [67004] Microsoft Internet Explorer 10/11 memory corruption
6138| [13537] Microsoft Internet Explorer 10/11 memory corruption
6139| [13535] Microsoft Internet Explorer 10/11 memory corruption
6140| [13530] Microsoft Internet Explorer 10/11 memory corruption
6141| [13529] Microsoft Internet Explorer 10/11 memory corruption
6142| [13523] Microsoft Internet Explorer 10/11 memory corruption
6143| [13516] Microsoft Internet Explorer 10/11 memory corruption
6144| [13513] Microsoft Internet Explorer 10/11 memory corruption
6145| [13510] Microsoft Internet Explorer 10/11 memory corruption
6146| [13507] Microsoft Internet Explorer 10 memory corruption
6147| [13506] Microsoft Internet Explorer 10 memory corruption
6148| [13498] Microsoft Internet Explorer 10/11 memory corruption
6149| [13495] Microsoft Internet Explorer 10/11 information disclosure
6150| [13491] Microsoft Internet Explorer 10/11 memory corruption
6151| [12546] Microsoft Internet Explorer 10/11 memory corruption
6152| [12544] Microsoft Internet Explorer 10/11 memory corruption
6153| [12421] Apple Mac OS X 10.8.5 QuickLook Microsoft Office Document memory corruption
6154| [11435] Microsoft Internet Explorer 10/11 Permission privilege escalation
6155| [11433] Microsoft Internet Explorer 10 memory corruption
6156| [10625] Microsoft Internet Explorer 10 memory corruption
6157| [10624] Microsoft Internet Explorer 10 memory corruption
6158| [10621] Microsoft Internet Explorer 10 memory corruption
6159| [10620] Microsoft Internet Explorer 10 memory corruption
6160| [10219] Microsoft Internet Explorer 10 memory corruption
6161| [9813] Microsoft Internet Explorer up to 10 Garbage Collection jscript9.dll Recycler::ProcessMark information disclosure
6162| [9414] Microsoft Internet Explorer 10 Use-After-Free memory corruption
6163| [9411] Microsoft Internet Explorer 10 memory corruption
6164| [9097] Microsoft Internet Explorer 10 Use-After-Free memory corruption
6165| [9092] Microsoft Internet Explorer 10 MSHTML CEditAdorner::Detach memory corruption
6166| [9090] Microsoft Internet Explorer 10 memory corruption
6167| [8715] Microsoft Internet Explorer 10.x Use-After-Free memory corruption
6168| [7978] Microsoft Internet Explorer 10 Sandbox unknown vulnerability
6169| [8432] Microsoft Internet Explorer 10 HTML5 Engine localStorage denial of service
6170| [7104] Microsoft Internet Explorer up to 10 Mouse/Keyboard Activity edit.php fireEvent information disclosure
6171| [3247] Microsoft Media Player up to 10.x Skin Decompressor Heap-based cross site scripting
6172| [3246] Microsoft Media Player up to 10.x Skin Header Parser memory corruption
6173| [2724] Microsoft Windows up to 10 Media Player ASX Playlist Heap-based memory corruption
6174|
6175| MITRE CVE - https://cve.mitre.org:
6176| [CVE-2012-4591] About.aspx in the Portal in McAfee Enterprise Mobility Manager (EMM) before 10.0 discloses the name of the user account for an IIS worker process, which allows remote attackers to obtain potentially sensitive information by visiting this page.
6177| [CVE-2012-1945] Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
6178| [CVE-2012-1459] The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
6179| [CVE-2012-1457] The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
6180| [CVE-2012-1453] The CAB file parser in Dr.Web 5.0.2.03300, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Sophos Anti-Virus 4.61.0, Trend Micro AntiVirus 9.120.0.1004, McAfee Gateway (formerly Webwasher) 2010.1C, Emsisoft Anti-Malware 5.1.0.1, CA eTrust Vet Antivirus 36.1.8511, Antiy Labs AVL SDK 2.0.3.7, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Rising Antivirus 22.83.00.03, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via a CAB file with a modified coffFiles field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations.
6181| [CVE-2012-1443] The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky Anti-Virus 7.0.0.125, Jiangmin Antivirus 13.0.900, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, Sophos Anti-Virus 4.61.0, NOD32 Antivirus 5795, Avira AntiVir 7.11.1.163, Norman Antivirus 6.06.12, McAfee Anti-Virus Scanning Engine 5.400.0.1158, Panda Antivirus 10.0.2.7, McAfee Gateway (formerly Webwasher) 2010.1C, Trend Micro AntiVirus 9.120.0.1004, Comodo Antivirus 7424, Bitdefender 7.2, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, nProtect Anti-Virus 2011-01-17.01, AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, avast! Antivirus 4.8.1351.0 and 5.0.677.0, and VBA32 3.12.14.2 allows user-assisted remote attackers to bypass malware detection via a RAR file with an initial MZ character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different RAR parser implementations.
6182| [CVE-2012-1436] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \2D\6C\68 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
6183| [CVE-2012-1435] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \50\4B\4C\49\54\45 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
6184| [CVE-2012-1434] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \19\04\00\10 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
6185| [CVE-2012-1433] The Microsoft EXE file parser in AhnLab V3 Internet Security 2011.01.18.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \4a\46\49\46 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
6186| [CVE-2012-1432] The Microsoft EXE file parser in Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an EXE file with a \57\69\6E\5A\69\70 character sequence at a certain location. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations.
6187| [CVE-2012-1420] The TAR file parser in Quick Heal (aka Cat QuickHeal) 11.00, Command Antivirus 5.2.11.5, F-Prot Antivirus 4.6.2.117, Fortinet Antivirus 4.2.254.0, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, Panda Antivirus 10.0.2.7, and Rising Antivirus 22.83.00.03 allows remote attackers to bypass malware detection via a POSIX TAR file with an initial \7fELF character sequence. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
6188| [CVE-2010-2375] Package/Privilege: Plugins for Apache, Sun and IIS web servers Unspecified vulnerability in the WebLogic Server component in Oracle Fusion Middleware 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality and integrity, related to IIS.
6189| [CVE-2010-1681] Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
6190| [CVE-2009-1016] Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote authenticated users to affect confidentiality, integrity, and availability, related to IIS. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow involving an unspecified Server Plug-in and a crafted SSL certificate.
6191| [CVE-2009-1012] Unspecified vulnerability in the plug-ins for Apache and IIS web servers in Oracle BEA WebLogic Server 7.0 Gold through SP7, 8.1 Gold through SP6, 9.0, 9.1, 9.2 Gold through MP3, 10.0 Gold through MP1, and 10.3 allows remote attackers to affect confidentiality, integrity, and availability. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in an unspecified plug-in that parses HTTP requests, which leads to a heap-based buffer overflow.
6192| [CVE-2009-0537] Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD
6193| [CVE-2008-5457] Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
6194| [CVE-2008-2579] Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors.
6195| [CVE-2008-2463] The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
6196| [CVE-2007-3901] Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.
6197| [CVE-2007-3895] Buffer overflow in Microsoft DirectShow in Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted (1) WAV or (2) AVI file.
6198| [CVE-2006-6601] Windows Media Player 10.00.00.4036 in Microsoft Windows XP SP2 allows user-assisted remote attackers to cause a denial of service via a .MID (MIDI) file with a malformed header chunk without any track chunks, possibly involving (1) number of tracks of (2) time division fields that are set to 0.
6199| [CVE-2006-6134] Heap-based buffer overflow in the WMCheckURLScheme function in WMVCORE.DLL in Microsoft Windows Media Player (WMP) 10.00.00.4036 on Windows XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to cause a denial of service (application crash) and execute arbitrary code via a long HREF attribute, using an unrecognized protocol, in a REF element in an ASX PlayList file.
6200| [CVE-2004-1312] A bug in the HTML parser in a certain Microsoft HTML library, as used in various third party products, may allow remote attackers to cause a denial of service via certain strings, as reported in GFI MailEssentials for Exchange 9 and 10, and GFI MailSecurity for Exchange 8, which causes emails to remain in IIS or Exchange mail queues.
6201| [CVE-2013-4015] Microsoft Internet Explorer 6 through 10 allows local users to bypass the elevation policy check in the (1) Protected Mode or (2) Enhanced Protected Mode protection mechanism, and consequently gain privileges, by leveraging the ability to execute sandboxed code.
6202| [CVE-2013-3166] Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via vectors involving incorrect auto-selection of the Shift JIS encoding, leading to cross-domain scrolling events, aka "Shift JIS Character Encoding Vulnerability," a different vulnerability than CVE-2013-0015.
6203| [CVE-2013-3163] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.
6204| [CVE-2013-3162] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3115.
6205| [CVE-2013-3161] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3143.
6206| [CVE-2013-3153] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3148.
6207| [CVE-2013-3152] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3146.
6208| [CVE-2013-3151] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.
6209| [CVE-2013-3148] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3153.
6210| [CVE-2013-3146] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.
6211| [CVE-2013-3144] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.
6212| [CVE-2013-3143] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
6213| [CVE-2013-3142] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3139.
6214| [CVE-2013-3139] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
6215| [CVE-2013-3126] Microsoft Internet Explorer 9 and 10, when script debugging is enabled, does not properly handle objects in memory during the processing of script, which allows remote attackers to execute arbitrary code via a crafted web site, aka "Internet Explorer Script Debug Vulnerability."
6216| [CVE-2013-3125] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3120.
6217| [CVE-2013-3123] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3111.
6218| [CVE-2013-3121] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3139, and CVE-2013-3142.
6219| [CVE-2013-3120] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.
6220| [CVE-2013-3119] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3114.
6221| [CVE-2013-3118] Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3120 and CVE-2013-3125.
6222| [CVE-2013-3115] Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3162.
6223| [CVE-2013-3114] Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3119.
6224| [CVE-2013-3113] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
6225| [CVE-2013-3112] Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3113, CVE-2013-3121, CVE-2013-3139, and CVE-2013-3142.
6226| [CVE-2013-3111] Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.
6227| [CVE-2013-2552] Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
6228| [CVE-2013-2551] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
6229| [CVE-2013-1338] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1304.
6230| [CVE-2013-1312] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
6231| [CVE-2013-1309] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
6232| [CVE-2013-1308] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
6233| [CVE-2013-1304] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1338.
6234| [CVE-2013-1303] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1304 and CVE-2013-1338.
6235| [CVE-2013-0094] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability."
6236| [CVE-2013-0093] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability."
6237| [CVE-2013-0092] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."
6238| [CVE-2013-0090] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
6239| [CVE-2013-0089] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."
6240| [CVE-2013-0088] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."
6241| [CVE-2013-0087] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer OnResize Use After Free Vulnerability."
6242| [CVE-2013-0030] The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."
6243| [CVE-2013-0027] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CPasteCommand Use After Free Vulnerability."
6244| [CVE-2013-0023] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."
6245| [CVE-2013-0021] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
6246| [CVE-2013-0019] Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
6247| [CVE-2012-6502] Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a name-value pair from a local file via a \\127.0.0.1\C$\ sequence.
6248| [CVE-2012-5674] Unspecified vulnerability in Adobe ColdFusion 10 before Update 5, when Internet Information Services (IIS) is used, allows attackers to cause a denial of service via unknown vectors.
6249| [CVE-2012-4787] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
6250| [CVE-2012-4782] Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability."
6251| [CVE-2012-4781] Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."
6252| [CVE-2012-1876] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
6253| [CVE-2012-1545] Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, allows remote attackers to bypass Protected Mode or cause a denial of service (memory corruption) by leveraging access to a Low integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
6254| [CVE-2011-1417] Integer overflow in QuickLook, as used in Apple Mac OS X before 10.6.7 and MobileSafari in Apple iOS before 4.2.7 and 4.3.x before 4.3.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a Microsoft Office document with a crafted size field in the OfficeArtMetafileHeader, related to OfficeArtBlip, as demonstrated on the iPhone by Charlie Miller and Dion Blazakis during a Pwn2Own competition at CanSecWest 2011.
6255| [CVE-2011-0627] Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
6256| [CVE-2011-0208] QuickLook in Apple Mac OS X 10.6 before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office document.
6257| [CVE-2010-3785] Buffer overflow in QuickLook in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document.
6258| [CVE-2009-3032] Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow.
6259| [CVE-2009-2838] Integer overflow in QuickLook in Apple Mac OS X 10.5.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Microsoft Office document that triggers a buffer overflow.
6260| [CVE-2009-0944] The Microsoft Office Spotlight Importer in Spotlight in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 does not properly validate Microsoft Office files, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a file that triggers memory corruption.
6261| [CVE-2008-5745] Integer overflow in quartz.dll in the DirectShow framework in Microsoft Windows Media Player (WMP) 9, 10, and 11, including 11.0.5721.5260, allows remote attackers to cause a denial of service (application crash) via a crafted (1) WAV, (2) SND, or (3) MID file. NOTE: this has been incorrectly reported as a code-execution vulnerability. NOTE: it is not clear whether this issue is related to CVE-2008-4927.
6262| [CVE-2008-4211] Integer signedness error in (1) QuickLook in Apple Mac OS X 10.5.5 and (2) Office Viewer in Apple iPhone OS 1.0 through 2.1 and iPhone OS for iPod touch 1.1 through 2.1 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted Microsoft Excel file that triggers an out-of-bounds memory access, related to "handling of columns."
6263| [CVE-2008-3697] An unspecified ISAPI extension in VMware Server before 1.0.7 build 108231 allows remote attackers to cause a denial of service (IIS crash) via a malformed request.
6264| [CVE-2008-2325] QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."
6265| [CVE-2007-5861] Unspecified vulnerability in Spotlight in Apple Mac OS X 10.4.11 allows user-assisted attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted .XLS file that triggers memory corruption in the Microsoft Office Spotlight Importer.
6266| [CVE-2007-3576] ** DISPUTED ** Microsoft Internet Explorer 6 executes web script from URIs of arbitrary scheme names ending with the "script" character sequence, using the (1) vbscript: handler for scheme names with 7 through 9 characters, and the (2) javascript: handler for scheme names with 10 or more characters, which might allow remote attackers to bypass certain XSS protection schemes. NOTE: other researchers dispute the significance of this issue, stating "this only works when typed in the address bar."
6267| [CVE-2007-3037] Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that causes a size mismatch between compressed and decompressed data and triggers a heap-based buffer overflow, aka "Windows Media Player Code Execution Vulnerability Parsing Skins."
6268| [CVE-2007-3035] Unspecified vulnerability in Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that is not properly handled during decompression, aka "Windows Media Player Code Execution Vulnerability Decompressing Skins."
6269| [CVE-2006-3992] Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.
6270| [CVE-2006-2058] Argument injection vulnerability in Avant Browser 10.1 Build 17 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API.
6271| [CVE-2006-0935] Microsoft Word 2003 allows remote attackers to cause a denial of service (application crash) via a crafted file, as demonstrated by 101_filefuzz.
6272| [CVE-2006-0025] Stack-based buffer overflow in Microsoft Windows Media Player 9 and 10 allows remote attackers to execute arbitrary code via a PNG image with a large chunk size.
6273| [CVE-2006-0006] Heap-based buffer overflow in the bitmap processing routine in Microsoft Windows Media Player 7.1 on Windows 2000 SP4, Media Player 9 on Windows 2000 SP4 and XP SP1, and Media Player 10 on XP SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted bitmap (.BMP) file that specifies a size of 0 but contains additional data.
6274| [CVE-2006-0005] Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
6275| [CVE-2005-3568] db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING."
6276| [CVE-2005-2502] Buffer overflow in AppKit for Mac OS X 10.3.9 and 10.4.2, as used in applications such as TextEdit, allows external user-assisted attackers to execute arbitrary code via a crafted Microsoft Word file.
6277| [CVE-2005-1683] Buffer overflow in winword.exe 10.2627.6714 and earlier in Microsoft Word for the Macintosh, before SP3 for Word 2002, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted mcw file.
6278| [CVE-2005-0545] Microsoft Windows XP Pro SP2 and Windows 2000 Server SP4 running Active Directory allow local users to bypass group policies that restrict access to hidden drives by using the browse feature in Office 10 applications such as Word or Excel, or using a flash drive. NOTE: this issue has been disputed in a followup post.
6279| [CVE-2004-0204] Directory traversal vulnerability in the web viewers for Business Objects Crystal Reports 9 and 10, and Crystal Enterprise 9 or 10, as used in Visual Studio .NET 2003 and Outlook 2003 with Business Contact Manager, Microsoft Business Solutions CRM 1.2, and other products, allows remote attackers to read and delete arbitrary files via ".." sequences in the dynamicimag argument to crystalimagehandler.aspx.
6280|
6281| SecurityFocus - https://www.securityfocus.com/bid/:
6282| [3471] Microsoft IE 5.1 for Mac OS X 10.1 Download Execution Vulnerability
6283|
6284| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6285| [82776] Microsoft Internet Explorer 10 on Windows 8 sandbox security bypass
6286| [66404] Microsoft Windows kernel-mode driver (win32k.sys) variant 10 privilege escalation
6287|
6288| Exploit-DB - https://www.exploit-db.com:
6289| [6124] Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
6290| [19103] HP HP-UX <= 10.34,Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3
6291|
6292| OpenVAS (Nessus) - http://www.openvas.org:
6293| [855384] Solaris Update for snmp/mibiisa 108870-36
6294| [855273] Solaris Update for snmp/mibiisa 108869-36
6295| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
6296|
6297| SecurityTracker - https://www.securitytracker.com:
6298| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
6299|
6300| OSVDB - http://www.osvdb.org:
6301| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
6302| [87262] Microsoft IIS FTP Command Injection Information Disclosure
6303| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
6304| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
6305| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
6306| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
6307| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
6308| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
6309| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
6310| [71856] Microsoft IIS Status Header Handling Remote Overflow
6311| [71671] Microsoft Windows afd.sys 120CFh IOCTL Handling Local DoS
6312| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
6313| [68570] Microsoft Office Excel Lotus 1-2-3 Workbook Parsing Remote Overflow
6314| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
6315| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
6316| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
6317| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
6318| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
6319| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
6320| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
6321| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
6322| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
6323| [60273] Microsoft Windows NT Virtual DOS Machine 16-bit Executable Permission Bypass Local Privilege Escalation
6324| [59892] Microsoft IIS Malformed Host Header Remote DoS
6325| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
6326| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
6327| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
6328| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
6329| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
6330| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
6331| [55269] Microsoft IIS Traversal GET Request Remote DoS
6332| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
6333| [53309] Microsoft Windows WINS 1Ch Registration Domain Controller Manipulation
6334| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
6335| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
6336| [52238] Microsoft IIS IDC Extension XSS
6337| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
6338| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
6339| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
6340| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
6341| [43451] Microsoft IIS HTTP Request Smuggling
6342| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
6343| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
6344| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
6345| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
6346| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
6347| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
6348| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
6349| [31607] Microsoft Visual Studio 1 TYPELIB MOVEABLE PURE .rc File Name Overflow
6350| [29444] Microsoft Excel Crafted Lotus 1-2-3 File Arbitrary Code Execution
6351| [29409] Microsoft Windows TCP 135 Crafted Packet Saturation DoS
6352| [28726] Microsoft Works Malformed Lotus 1-2-3 Spreadsheet DoS
6353| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
6354| [28132] Microsoft IE HTTP 1.1 URL Parsing Overflow
6355| [27152] Microsoft Windows IIS ASP Page Processing Overflow
6356| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
6357| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
6358| [21805] Microsoft IIS Crafted URL Remote DoS
6359| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
6360| [19996] Microsoft Windows 2000 Event ID 1704 Group Policy Failure
6361| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
6362| [17124] Microsoft IIS Malformed WebDAV Request DoS
6363| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
6364| [17122] Microsoft IIS Permission Weakness .COM File Upload
6365| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
6366| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
6367| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
6368| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
6369| [13760] Microsoft IIS Malformed URL Request DoS
6370| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
6371| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
6372| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
6373| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
6374| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
6375| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
6376| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
6377| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
6378| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
6379| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
6380| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
6381| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
6382| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
6383| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
6384| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
6385| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
6386| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
6387| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
6388| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
6389| [11257] Microsoft IIS Malformed GET Request DoS
6390| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
6391| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
6392| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
6393| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
6394| [9200] Microsoft IIS Unspecified XSS Variant
6395| [9199] Microsoft IIS shtml.dll XSS
6396| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
6397| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
6398| [7737] Microsoft IIS ASP Redirection Function XSS
6399| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
6400| [5851] Microsoft IIS Single Dot Source Code Disclosure
6401| [5736] Microsoft IIS Relative Path System Privilege Escalation
6402| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
6403| [5633] Microsoft IIS Invalid WebDAV Request DoS
6404| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
6405| [5584] Microsoft IIS URL Redirection Malformed Length DoS
6406| [5566] Microsoft IIS Form_VBScript.asp XSS
6407| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
6408| [4864] Microsoft IIS TRACK Logging Failure
6409| [4863] Microsoft IIS Active Server Page Header DoS
6410| [4791] Microsoft IIS Response Object DoS
6411| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
6412| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
6413| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
6414| [3500] Microsoft IIS fpcount.exe Remote Overflow
6415| [3341] Microsoft IIS Redirect Response XSS
6416| [3339] Microsoft IIS HTTP Error Page XSS
6417| [3338] Microsoft IIS Help File XSS
6418| [3328] Microsoft IIS FTP Status Request DoS
6419| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
6420| [3325] Microsoft IIS HTR ISAPI Overflow
6421| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
6422| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
6423| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
6424| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
6425| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
6426| [3231] Microsoft IIS Log Bypass
6427| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
6428| [1931] Microsoft IIS MIME Content-Type Header DoS
6429| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
6430| [1826] Microsoft IIS Domain Guest Account Disclosure
6431| [1824] Microsoft IIS FTP DoS
6432| [1804] Microsoft IIS Long Request Parsing Remote DoS
6433| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
6434| [1750] Microsoft IIS File Fragment Disclosure
6435| [1543] Microsoft NT/IIS Invalid URL Request DoS
6436| [1504] Microsoft IIS File Permission Canonicalization Bypass
6437| [1465] Microsoft IIS .htr Missing Variable DoS
6438| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
6439| [1322] Microsoft IIS Malformed .htr Request DoS
6440| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
6441| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
6442| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
6443| [1170] Microsoft IIS Escape Character URL Access Bypass
6444| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
6445| [1082] Microsoft IIS Domain Resolution Access Bypass
6446| [1041] Microsoft IIS Malformed HTTP Request Header DoS
6447| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
6448| [930] Microsoft IIS Shared ASP Cache Information Disclosure
6449| [929] Microsoft IIS FTP Server NLST Command Overflow
6450| [928] Microsoft IIS Long Request Log Evasion
6451| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
6452| [814] Microsoft IIS global.asa Remote Information Disclosure
6453| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
6454| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
6455| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
6456| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
6457| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
6458| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
6459| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
6460| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
6461| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
6462| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
6463| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
6464| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
6465| [473] Microsoft IIS Multiple .cnf File Information Disclosure
6466| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
6467| [470] Microsoft IIS Form_JScript.asp XSS
6468| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
6469| [436] Microsoft IIS Unicode Remote Command Execution
6470| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
6471| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
6472| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
6473| [308] Microsoft IIS Malformed File Extension URL DoS
6474| [285] Microsoft IIS repost.asp File Upload
6475| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
6476| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
6477| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
6478| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
6479| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
6480| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
6481| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
6482| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
6483| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
6484| [98] Microsoft IIS perl.exe HTTP Path Disclosure
6485| [97] Microsoft IIS ISM.DLL HTR Request Overflow
6486| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
6487| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
6488| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
6489| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
6490| [2] Microsoft IIS ExAir search.asp Direct Request DoS
6491| [96197] Microsoft Windows TCP/IP Stack Crafted ICMPv6 Packet Handling Remote DoS
6492| [96195] Microsoft Windows NAT Driver Crafted ICMP Packet Handling Remote Memory Corruption DoS
6493| [96194] Microsoft Windows Asynchronous RPC Request Handling Remote Code Execution
6494| [96193] Microsoft Windows Unicode Scripts Processor (USP10.DLL) Uniscribe Font Parsing Engine Unspecified Memory Corruption
6495| [96192] Microsoft IE EUC-JP Character Encoding XSS
6496| [96191] Microsoft IE Process Integrity Level Assignment Bypass
6497| [96190] Microsoft IE Unspecified Memory Corruption (2013-3199)
6498| [96189] Microsoft IE Unspecified Memory Corruption (2013-3194)
6499| [96188] Microsoft IE Unspecified Memory Corruption (2013-3193)
6500| [96187] Microsoft IE Unspecified Memory Corruption (2013-3191)
6501| [96186] Microsoft IE Unspecified Memory Corruption (2013-3190)
6502| [96185] Microsoft IE Unspecified Memory Corruption (2013-3189)
6503| [96184] Microsoft IE Unspecified Memory Corruption (2013-3188)
6504| [96183] Microsoft IE Unspecified Memory Corruption (2013-3187)
6505| [96182] Microsoft IE Unspecified Memory Corruption (2013-3184)
6506| [96181] Microsoft Active Directory Federation Services (AD FS) Open Endpoint Unspecified Account Information Disclosure
6507| [96180] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3196)
6508| [96179] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3197)
6509| [96178] Microsoft Windows Kernel Address Value Handling Unspecified Local Memory Corruption (2013-3198)
6510| [95826] Microsoft IE jscript9.dll Recycler::ProcessMark Function Garbage Collection Object Address Information Disclosure Weakness
6511| [95687] Microsoft IE Enhanced / Protected Mode Elevation Policy Check Bypass
6512| [95667] Microsoft Windows XP Wireless Preferred Network List (PNL) Remote Disclosure
6513| [95617] Microsoft IE 9 Status Bar Spoofing Weakness
6514| [95589] Microsoft Windows Mobile Wireless Preferred Network List (PNL) Remote Disclosure
6515| [95569] Microsoft DirectShow Runtime quartz.dll CWAVEStream::GetMaxSampleSize() Function Multiple Sound File Handling Divide-by-Zero DoS Weakness
6516| [94987] Microsoft Windows Defender Improper Pathname Handling Local Privilege Escalation
6517| [94986] Microsoft Windows Media Format Runtime Media File Handling Arbitrary Code Execution
6518| [94985] Microsoft Windows DirectShow GIF File Handling Memory Overwrite Arbitrary Code Execution
6519| [94984] Microsoft IE Shift JIS Character Encoding XSS
6520| [94983] Microsoft IE Unspecified Memory Corruption (2013-3115)
6521| [94982] Microsoft IE Unspecified Memory Corruption (2013-3164)
6522| [94981] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution (2013-3163)
6523| [94980] Microsoft IE Unspecified Memory Corruption (2013-3162)
6524| [94979] Microsoft IE Unspecified Memory Corruption (2013-3161)
6525| [94978] Microsoft IE Unspecified Memory Corruption (2013-3153)
6526| [94977] Microsoft IE Unspecified Memory Corruption (2013-3152)
6527| [94976] Microsoft IE Unspecified Memory Corruption (2013-3151)
6528| [94975] Microsoft IE Unspecified Memory Corruption (2013-3150)
6529| [94974] Microsoft IE Unspecified Memory Corruption (2013-3146)
6530| [94973] Microsoft IE Unspecified Memory Corruption (2013-3149)
6531| [94972] Microsoft IE Unspecified Memory Corruption (2013-3148)
6532| [94971] Microsoft IE Unspecified Memory Corruption (2013-3147)
6533| [94969] Microsoft IE Unspecified Memory Corruption (2013-3145)
6534| [94968] Microsoft IE Unspecified Memory Corruption (2013-3144)
6535| [94967] Microsoft IE Unspecified Memory Corruption (2013-3143)
6536| [94966] Microsoft Windows win32k.sys Memory Object Dereference Handling Local Privilege Escalation
6537| [94965] Microsoft Windows win32k.sys Memory Object Allocation Handling Local Privilege Escalation
6538| [94964] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
6539| [94963] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow DoS
6540| [94962] Microsoft Windows win32k.sys Memory Object Handling Local Information Disclosure
6541| [94961] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
6542| [94960] Microsoft Multiple Product TrueType Font (TTF) File Handling Arbitrary Code Execution
6543| [94959] Microsoft .NET Framework / Silverlight Multidimensional Arrays Small Structure Handling Arbitrary Code Execution
6544| [94958] Microsoft Silverlight NULL Pointer Handling Arbitrary Code Execution
6545| [94957] Microsoft .NET Framework Delegate Object Serialization Permission Validation Privilege Escalation
6546| [94956] Microsoft .NET Framework Small Structure Array Allocation Remote Code Execution
6547| [94955] Microsoft .NET Framework Anonymous Method Injection Reflection Objection Permission Validation Privilege Escalation
6548| [94954] Microsoft .NET Framework Delegate Reflection Bypass Reflection Objection Permission Validation Privilege Escalation
6549| [94507] Microsoft IE Infinite Loop DoS
6550| [94330] Microsoft Outlook S/MIME EmailAddress Attribute Mismatch Weakness
6551| [94127] Microsoft Office PNG File Handling Buffer Overflow
6552| [94126] Microsoft Windows Print Spooler Printer Deletion Memory Handling Local Privilege Escalation
6553| [94125] Microsoft Windows TCP/IP Driver TCP Connection Crafted Packet Handling Remote Integer Overflow DoS
6554| [94124] Microsoft Windows Kernel Page Fault System Call Handling Local Information Disclosure
6555| [94123] Microsoft IE Webpage Script Debugging Memory Corruption
6556| [94122] Microsoft IE Unspecified Memory Corruption (2013-3142)
6557| [94121] Microsoft IE Unspecified Memory Corruption (2013-3141)
6558| [94120] Microsoft IE Unspecified Memory Corruption (2013-3139)
6559| [94119] Microsoft IE Unspecified Memory Corruption (2013-3125)
6560| [94118] Microsoft IE Unspecified Memory Corruption (2013-3124)
6561| [94117] Microsoft IE Unspecified Memory Corruption (2013-3123)
6562| [94116] Microsoft IE Unspecified Memory Corruption (2013-3122)
6563| [94115] Microsoft IE Unspecified Memory Corruption (2013-3121)
6564| [94114] Microsoft IE Unspecified Memory Corruption (2013-3120)
6565| [94113] Microsoft IE Unspecified Memory Corruption (2013-3119)
6566| [94112] Microsoft IE Unspecified Memory Corruption (2013-3118)
6567| [94111] Microsoft IE Unspecified Memory Corruption (2013-3117)
6568| [94110] Microsoft IE Unspecified Memory Corruption (2013-3116)
6569| [94109] Microsoft IE Unspecified Memory Corruption (2013-3114)
6570| [94108] Microsoft IE Unspecified Memory Corruption (2013-3113)
6571| [94107] Microsoft IE Unspecified Memory Corruption (2013-3112)
6572| [94106] Microsoft IE Unspecified Memory Corruption (2013-3111)
6573| [94105] Microsoft IE Unspecified Memory Corruption (2013-3110)
6574| [93539] Microsoft Windows win32k.sys EPATHOBJ::pprFlattenRec / EPATHOBJ::bFlatten Functions Local Privilege Escalation
6575| [93396] Microsoft Malware Protection Engine Crafted File Scan Handling Memory Corruption
6576| [93320] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation
6577| [93319] Microsoft Windows win32k.sys Memory Object Handling Local Buffer Overflow
6578| [93318] Microsoft Windows DirectX Graphics Kernel Subsystem (dxgkrnl.sys) Memory Object Handling Local Privilege Escalation
6579| [93317] Microsoft Windows Essentials Windows Writer Crafted URL Handling Arbitrary File Overwrite
6580| [93316] Microsoft Visio File Handling External Entity (XXE) Data Parsing Arbitrary File Access
6581| [93315] Microsoft Office Word DOC File Shape Data Handling Arbitrary Code Execution
6582| [93314] Microsoft Office Publisher PUB File Handling Buffer Underflow
6583| [93313] Microsoft Office Publisher PUB File Pointer Handling Arbitrary Code Execution
6584| [93312] Microsoft Office Publisher PUB File Signed Integer Handling Arbitrary Code Execution
6585| [93311] Microsoft Office Publisher PUB File Incorrect NULL Value Handling Arbitrary Code Execution
6586| [93310] Microsoft Office Publisher PUB File Invalid Range Check Handling Arbitrary Code Execution
6587| [93309] Microsoft Office Publisher PUB File Return Value Validation Arbitrary Code Execution
6588| [93308] Microsoft Office Publisher PUB File Handling Buffer Overflow
6589| [93307] Microsoft Office Publisher PUB File Return Value Handling Arbitrary Code Execution
6590| [93306] Microsoft Office Publisher PUB File Corrupt Interface Pointer Handling Arbitrary Code Execution
6591| [93305] Microsoft Office Publisher PUB File Handling Integer Overflow
6592| [93304] Microsoft Office Publisher PUB File Negative Value Allocation Handling Arbitrary Code Execution
6593| [93303] Microsoft Lync Unspecified Use-after-free Arbitrary Code Execution
6594| [93302] Microsoft .NET Framework WCF Endpoint Authentication Unspecified Policy Requirement Weakness Authentication Bypass
6595| [93301] Microsoft .NET Framework XML File Signature Validation Spoofing Weakness
6596| [93300] Microsoft Windows HTTP Protocol Stack (HTTP.sys) Crafted HTTP Header Handling Infinite Loop Remote DoS
6597| [93298] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
6598| [93297] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1312)
6599| [93296] Microsoft IE textNode Style Computation Use-after-free Arbitrary Code Execution
6600| [93295] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1310)
6601| [93294] Microsoft IE CDispNode Use-after-free Arbitrary Code Execution
6602| [93293] Microsoft IE TransNavContext Object Handling Use-after-free Arbitrary Code Execution
6603| [93292] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1307)
6604| [93291] Microsoft IE Anchor Element Handling Use-after-free Arbitrary Code Execution
6605| [93290] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-0811)
6606| [93289] Microsoft IE Unspecified JSON Data File Information Disclosure
6607| [93081] Microsoft Security Essentials UninstallString Unquoted Search Path Local Privilege Escalation Weakness
6608| [93075] Forbes Magazine Microsoft Office 365 T-Mobile Router Admin Interface Default Password
6609| [93005] Microsoft IE MSXML XMLDOM Object Local File Enumeration
6610| [92993] Microsoft IE CGenericElement Object Handling Use-after-free Arbitrary Code Execution
6611| [92931] Microsoft System Center Operations Manager Web Console /InternalPages/ViewTypeManager.aspx Multiple Parameter XSS
6612| [92913] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1338)
6613| [92284] Microsoft IE localStorage Method History Manipulation Disk Consumption DoS
6614| [92257] Microsoft IE CSS Import Handling Remote DoS
6615| [92133] Microsoft Windows NTFS NULL Pointer Dereference Local Privilege Escalation
6616| [92132] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1292)
6617| [92131] Microsoft Windows win32k.sys Crafted Font File Handling DoS
6618| [92130] Microsoft Windows win32k.sys Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1283)
6619| [92129] Microsoft Office HTML Sanitization Component Unspecified XSS
6620| [92128] Microsoft Antimalware Client Improper Pathname Handling Local Privilege Escalation Weakness
6621| [92127] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unspecified Local Memory Corruption
6622| [92126] Microsoft Windows Multiple Active Directory Components LDAP Crafted Query Handling Memory Consumption Remote DoS
6623| [92125] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1294)
6624| [92124] Microsoft Windows Kernel Unspecified Memory Object Handling Race Condition Local Privilege Escalation (2013-1284)
6625| [92123] Microsoft SharePoint Server SharePoint Lists Access Control Handling Unspecified Information Disclosure
6626| [92122] Microsoft Windows Remote Desktop Client ActiveX (mstscax.dll) Use-after-free Arbitrary Code Execution
6627| [92121] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1304)
6628| [92120] Microsoft IE Unspecified Use-after-free Arbitrary Code Execution (2013-1303)
6629| [91696] Microsoft Windows Modern Mail Unspecified Spoofing Weakness
6630| [91269] Microsoft Windows 8 TrueType Font (TTF) Handling Unspecified DoS
6631| [91199] FFmpeg libavcodec msrledec.c msrle_decode_8_16_24_32 Function Microsoft RLE Data Processing DoS
6632| [91198] Microsoft IE Broker Process Variant Object Handling Sandbox Bypass Arbitrary Code Execution
6633| [91197] Microsoft IE vml.dll Vector Graphic Property Handling Integer Overflow
6634| [91196] Microsoft IE Broker Pop-up Window Handling Protected Mode Bypass (pwn2own)
6635| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
6636| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
6637| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
6638| [91157] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1287)
6639| [91156] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1286)
6640| [91155] Microsoft Windows USB RNDIS Driver Memory Object Handling Unspecified Local Privilege Escalation (2013-1285)
6641| [91154] Microsoft Office for Mac HTML5 Email Message Unspecified Content Tag Loading Information Disclosure
6642| [91153] Microsoft OneNote Buffer Size Validation ONE File Handling Information Disclosure
6643| [91152] Microsoft SharePoint Unspecified Remote Buffer Overflow DoS
6644| [91151] Microsoft SharePoint Unspecified Traversal Privilege Escalation
6645| [91150] Microsoft SharePoint Unspecified XSS
6646| [91149] Microsoft SharePoint Callback Function Unspecified URL Handling Privilege Escalation
6647| [91148] Microsoft Visio Viewer Unspecified Tree Object Type Confusion Visio File Handling Arbitrary Code Execution
6648| [91147] Microsoft Silverlight Application Handling Unspecified Double Dereference Arbitrary Code Execution
6649| [91146] Microsoft IE CTreeNode Unspecified Use-after-free Arbitrary Code Execution
6650| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
6651| [91144] Microsoft IE onBeforeCopy execCommand selectAll Event Handling Use-after-free Arbitrary Code Execution
6652| [91143] Microsoft IE GetMarkupPtr execCommand Print Event Handling Use-after-free Arbitrary Code Execution
6653| [91142] Microsoft IE CElement Unspecified Use-after-free Arbitrary Code Execution
6654| [91141] Microsoft IE CCaret Unspecified Use-after-free Arbitrary Code Execution
6655| [91140] Microsoft IE CMarkupBehaviorContext Object Handling Use-after-free Arbitrary Code Execution
6656| [91139] Microsoft IE saveHistory Onload Event Handler Event Handling Use-after-free Arbitrary Code Execution
6657| [91138] Microsoft IE OnResize / OnMove CElement::EnsureRecalcNotify() Function Use-after-free Arbitrary Code Execution
6658| [90933] Microsoft IE Arbitrary HTM File Execution
6659| [90257] Microsoft Windows Server 2003 ICACLS.EXE Permission Inheritance Weakness
6660| [90236] Microsoft Windows ZwSetInformationProcess() Function Process Priority Handling Local DoS
6661| [90166] Microsoft Windows Object Linking and Embedding (OLE) Automation Memory Allocation RTF File Handling Arbitrary Code Execution
6662| [90165] Microsoft Windows Win32.sys CSRSS Memory Object Handling Local Privilege Escalation
6663| [90164] Microsoft Windows TCP/IP Stack Crafted Connection Termination Packet (TCP PIN WAIT) Handling Remote DoS
6664| [90163] Microsoft Windows Memory Object Reference Count Handling Local Privilege Escalation
6665| [90162] Microsoft Windows Memory Object Handling Local Privilege Escalation (2013-1279)
6666| [90161] Microsoft Windows ApphelpCacheLookupEntry Function Memory Object Handling Local Privilege Escalation
6667| [90160] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1277)
6668| [90159] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1276)
6669| [90158] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1275)
6670| [90157] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1274)
6671| [90156] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1273)
6672| [90155] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1272)
6673| [90154] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1271)
6674| [90153] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1270)
6675| [90152] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1269)
6676| [90151] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1268)
6677| [90150] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1267)
6678| [90149] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1266)
6679| [90148] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1265)
6680| [90147] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1264)
6681| [90146] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1263)
6682| [90145] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1262)
6683| [90144] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1261)
6684| [90143] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1260)
6685| [90142] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1259)
6686| [90141] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1258)
6687| [90140] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1257)
6688| [90139] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1256)
6689| [90138] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1255)
6690| [90137] Microsoft Windows win32k.sys SfnINOUTSTYLECHANGE Function Memory Object Handling Local Privilege Escalation
6691| [90136] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1253)
6692| [90135] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1252)
6693| [90134] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1251)
6694| [90133] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1250)
6695| [90132] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1249)
6696| [90131] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2013-1248)
6697| [90130] Microsoft .NET Framework Windows Form Object Creation Callback Function Arbitrary Code Execution
6698| [90129] Microsoft Windows NFS Server Read-only Share File Operation Handling Remote DoS
6699| [90128] Microsoft Windows Media Content Handling Arbitrary Code Execution
6700| [90127] Microsoft IE Vector Markup Language (VML) Buffer Allocation Memory Corruption
6701| [90126] Microsoft IE CHTML CSelectionManager Object Handling Use-after-free Arbitrary Code Execution
6702| [90125] Microsoft IE CObjectElement Object Handling Use-after-free Arbitrary Code Execution
6703| [90124] Microsoft IE CPasteCommand Use-after-free Arbitrary Code Execution
6704| [90123] Microsoft IE InsertElement Use-after-free Arbitrary Code Execution
6705| [90122] Microsoft IE SLayoutRun Use-after-free Arbitrary Code Execution
6706| [90121] Microsoft IE pasteHTML TextRange Object Handling Use-after-free Arbitrary Code Execution
6707| [90120] Microsoft IE CDispNode SVG Object Handling Use-after-free Arbitrary Code Execution
6708| [90119] Microsoft IE LsGetTrailInfo Use-after-free Arbitrary Code Execution
6709| [90118] Microsoft IE vtable Use-after-free Arbitrary Code Execution
6710| [90117] Microsoft IE CMarkup / CData Object Handling Use-after-free Arbitrary Code Execution
6711| [90116] Microsoft IE COmWindowProxy Use-after-free Arbitrary Code Execution
6712| [90115] Microsoft IE SetCapture Method Handling Use-after-free Arbitrary Code Execution
6713| [90114] Microsoft IE Shift JIS Character Encoding Information Disclosure
6714| [89619] Microsoft IE Proxy Server TCP Session Re-use Cross-user Information Disclosure Weakness
6715| [89618] Microsoft IE HTTP / Secure Request Handling Spoofing Weakness
6716| [89553] Microsoft IE SRC Attribute UNC Share Pathname Handling Arbitrary File Information Disclosure
6717| [89315] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
6718| [89164] Microsoft Lync User-Agent Header Handling Remote Arbitrary Command Execution
6719| [89157] Microsoft Windows IPv6 Router Advertisement (RA) Flooding Weakness
6720| [88968] Microsoft .NET Framework Replace() Function Open Data Protocol (OData) HTTP Request Parsing Remote DoS
6721| [88967] Microsoft Windows SSL/TLS Forced Downgrade MitM Weakness
6722| [88966] Microsoft Windows win32k.sys Window Broadcast Message Handling Local Privilege Escalation
6723| [88965] Microsoft .NET Framework Double Construction Privilege Escalation
6724| [88964] Microsoft .NET Framework System.DirectoryServices.Protocols.SortRequestControl.GetValue() Method this.keys.Length Parameter Heap Buffer Overflow
6725| [88963] Microsoft .NET Framework Windows Forms (WinForms) Component System.Drawing.Imaging.EncoderParameters.ConvertToMemory() Method this.param.Length Parameter Multiple Application Handling Heap Buffer Overflow
6726| [88962] Microsoft .NET Framework System Drawing Memory Pointer Handling CAS Bypass Information Disclosure
6727| [88961] Microsoft System Center Operations Manager Web Console /InternalPages/ExecuteTask.aspx __CALLBACKPARAM Parameter XSS
6728| [88960] Microsoft System Center Operations Manager Web Console Unspecified XSS (2013-0009)
6729| [88959] Microsoft XML Core Services Integer Truncation XML Handling Memory Corruption
6730| [88958] Microsoft XML Core Services Unspecified XSLT Handling Memory Corruption
6731| [88956] Microsoft Windows Printer Spooler Service Print Job Handling Memory Corruption
6732| [88837] Microsoft Office Excel Memory Corruption DoS
6733| [88836] Microsoft Windows Paint BMP Image Parsing Memory Corruption
6734| [88811] Microsoft Visio VSD File Parsing Memory Corruption
6735| [88774] Microsoft IE CDwnBindInfo Object Handling Use-after-free Arbitrary Code Execution
6736| [88575] Microsoft Windows NT NtAcceptConnectPort Spoofed LPC Port Request Arbitrary Process Hijacking Weakness
6737| [88539] Microsoft IE mshtml.dll Unclosed Tags Sequence Handling Overflow Arbitrary Code Execution
6738| [88357] Microsoft IE fireEvent() Method Mouse / Keyboard Activity Disclosure
6739| [88320] Microsoft Windows TrueType Font (TTF) Parsing Unspecified Arbitrary Code Execution
6740| [88319] Microsoft IE InjectHTMLStream Object Handling Use-after-free Arbitrary Code Execution
6741| [88318] Microsoft IE CMarkup Object Handling Use-after-free Arbitrary Code Execution
6742| [88317] Microsoft IE Object Ref Counting Use-after-free Arbitrary Code Execution
6743| [88316] Microsoft Windows OpenType Font (OTF) Parsing Unspecified Arbitrary Code Execution
6744| [88315] Microsoft Office Word RTF listoverridecount Element Handling Remote Code Execution
6745| [88314] Microsoft Exchange Server RSS Feed Handling Unspecified Remote DoS
6746| [88313] Microsoft Windows KERNEL32.DLL Filename Parsing Memory Corruption Privilege Escalation
6747| [88312] Microsoft Windows DirectPlay Office File Handling Heap Overflow
6748| [88311] Microsoft IP-HTTPS Component Revoked Certificate Restriction Bypass
6749| [88170] Microsoft IE Malformed Location Header 30x Redirect Handling DoS
6750| [88051] Microsoft Windows Crafted DHCPv6 Message Remote DoS
6751| [87819] Microsoft Office OneNote File Handling Memory Corruption
6752| [87273] Microsoft Office Excel XLS File Handling Overflow
6753| [87272] Microsoft Office Excel XLS File Invalid Length SST Handling Use-after-free Arbitrary Code Execution
6754| [87271] Microsoft Office Excel XLS File Handling Memory Corruption
6755| [87270] Microsoft Office Excel SerAuxErrBar XLS File Handling Overflow
6756| [87269] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2553)
6757| [87268] Microsoft Windows win32k.sys Memory Object Handling Local Privilege Escalation (2012-2530)
6758| [87267] Microsoft .NET Framework WPF Reflection Optimization Object Permission Handling Arbitrary Code Execution
6759| [87266] Microsoft .NET Framework Web Proxy Setting Auto-Discovery (WPAD) Handling Remote Code Execution
6760| [87265] Microsoft .NET Framework Path Subversion Arbitrary DLL Injection Code Execution
6761| [87264] Microsoft .NET Framework Partially Trusted Code Function Handling Information Disclosure
6762| [87263] Microsoft .NET Framework Reflection Object Permission Handling Arbitrary Code Execution
6763| [87260] Microsoft Windows Briefcase Handling Underflow (2012-1527)
6764| [87259] Microsoft Windows Briefcase Handling Underflow (2012-1528)
6765| [87258] Microsoft IE CTreePos Deleted Object Handling Use-after-free Arbitrary Code Execution
6766| [87257] Microsoft IE CFormElement Deleted Object Handling Use-after-free Arbitrary Code Execution
6767| [87256] Microsoft IE CTreeNode Deleted Object Handling Use-after-free Arbitrary Code Execution
6768| [87255] Microsoft Office Excel XLS File Handling Memory Corruption
6769| [86929] Microsoft MN-700 Hardcoded SSL Private Key SSL Traffic Decryption Weakness
6770| [86913] Microsoft IE Recursive JavaScript Event Handling DoS
6771| [86906] Microsoft Multiple Products VBScript ActiveX Word Object Handling DoS
6772| [86905] Microsoft Windows NTFS ANSI API File Name Truncation Weakness
6773| [86903] Microsoft Windows NT CSRSS Malformed Console I/O Local DoS
6774| [86898] Microsoft IE Crafted IMG Tag Saturation Remote DoS
6775| [86896] Microsoft IE MSScriptControl.ScriptControl GetObject Arbitrary File Access
6776| [86866] Microsoft Windows Trusted Publisher Certificate Process Injection UAC Protection Bypass
6777| [86865] Microsoft Windows UAC Protection User-assisted Circumvention
6778| [86839] Microsoft Windows Media Player AVI File Handling Divide-by-Zero DoS
6779| [86790] Microsoft Virtual PC 2007 Crafted x86 Instruction Sequence Handling Local DoS
6780| [86776] Microsoft IE 9 File NULL Byte Handling XSS Filter Bypass
6781| [86768] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Handling Buffer Overflow
6782| [86767] Microsoft Office Publisher Read Access Violation PUB File Handling Memory Corruption
6783| [86733] Microsoft Office Picture Manager GIF Image File Handling Memory Corruption
6784| [86732] Microsoft Office DOC File Handling Stack Overflow
6785| [86623] Microsoft Office Excel / Excel Viewer (Xlview.exe) XLS File Handling Arbitrary Code Execution
6786| [86622] Microsoft SQL Server Local Authentication Bypass
6787| [86158] EMC NetWorker Module for Microsoft Applications (NMM) Communication Channel Crafted Message Parsing Remote Code Execution
6788| [86157] EMC NetWorker Module for Microsoft Applications (NMM) MS Exchange Server Upgrade / Installation Cleartext Admin Credential Local Information Disclosure
6789| [86061] Microsoft Windows Server 2008 R1 CSRSS ReadConsole / CloseHandle Local DoS
6790| [86060] Microsoft Windows Kerberos Implementation Session Handling Remote DoS
6791| [86059] Microsoft Multiple Product HTML String Sanitization XSS Weakness
6792| [86058] Microsoft Windows Kernel Unspecified Memory Object Handling Local Overflow
6793| [86057] Microsoft SQL Server Report Manager Unspecified XSS
6794| [86056] Microsoft Works Unspecified DOC File Handling Memory Corruption
6795| [86055] Microsoft Multiple Product RTF File listid Handling Use-after-free Remote Code Execution
6796| [86054] Microsoft Office Word File PAPX Section Handling Memory Corruption
6797| [85840] Microsoft Windows lpApplicationName Function Path Subversion Local Privilege Escalation
6798| [85833] Microsoft Outlook Concealed Attachment Weakness
6799| [85832] Microsoft Virtual Machine Custom Java Codebase Arbitrary Command Execution
6800| [85830] Microsoft IE index.dat OBJECT DATA Tag File Injection Arbitrary Command Execution
6801| [85826] Microsoft IE mstask.exe Malformed Packet Handling CPU Consumption Remote DoS
6802| [85749] Microsoft Windows win32k.sys TrueType Font File Handling Buffer Overflow
6803| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
6804| [85574] Microsoft IE cloneNode Element Use-after-free Memory Corruption
6805| [85573] Microsoft IE CTreeNode Object ISpanQualifier Instance Type Confusion Use-after-free Memory Corruption
6806| [85572] Microsoft IE Event Listener Unspecified Use-after-free Memory Corruption
6807| [85571] Microsoft IE OnMove Unspecified Use-after-free Memory Corruption
6808| [85532] Microsoft IE CMshtmlEd::Exec() Function Use-after-free Remote Code Execution
6809| [85444] Microsoft Windows NT MSIEXEC Registry Modification Local Privilege Escalation
6810| [85442] Microsoft Windows NT Predictable LPC Message Identifier Weakness
6811| [85418] Microsoft Windows Share Service File Handle Request Saturation Remote DoS
6812| [85316] Microsoft System Center Configuration Manager ReportChart.asp URI XSS
6813| [85315] Microsoft Visual Studio Team Foundation Server Unspecified XSS
6814| [85039] Microsoft Windows NT LPC Zone Exhaustion Local DoS
6815| [85038] Microsoft Windows Filename Extension Handling Overflow DoS
6816| [84912] Microsoft MS-CHAP V2 Virtual Private Network (VPN) MitM Password Disclosure
6817| [84886] McAfee Enterprise Mobility Manager (EMM) Portal About.aspx IIS Worker Process User Account Disclosure
6818| [84606] Microsoft Visio DXF File Handling Overflow
6819| [84605] Microsoft Office Computer Graphics Metafile (CGM) File Handling Memory Corruption
6820| [84604] Microsoft Windows JScript / VBScript Memory Object Size Calculation Website Handling Memory Corruption
6821| [84603] Microsoft Windows win32k.sys Use-after-free Local Privilege Escalation
6822| [84602] Microsoft Windows Remote Desktop Services Malformed RDP Packet Parsing Remote Code Execution
6823| [84601] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Stack Overflow
6824| [84600] Microsoft Windows Remote Administration Protocol Malformed RAP Request Parsing Remote Heap Overflow
6825| [84599] Microsoft Windows Print Spooler Service Remote Format String
6826| [84598] Microsoft Windows netapi32.dll Remote Administration Protocol Malformed RAP Request Parsing Remote DoS
6827| [84597] Microsoft IE JavaScript Parsing Memory Object Size Calculation Memory Corruption
6828| [84596] Microsoft IE NULL Object Handling Use-after-free Arbitrary Code Execution
6829| [84595] Microsoft IE Layout Handling Deleted Object Handling Memory Corruption
6830| [84594] Microsoft IE Deleted Virtual Function Table Handling Arbitrary Code Execution
6831| [84593] Microsoft Multiple Product Windows Common Controls TabStrip ActiveX (MSCOMCTL.OCX) Document Handling Arbitrary Code Execution
6832| [84553] Microsoft Help &
6833| [83860] Microsoft IE XML Data Handling Arbitrary File Access
6834| [83797] Microsoft IE on NT Hashed Password Remote Disclosure MiTM Weakness
6835| [83796] Microsoft Windows DCOM RPCSS.exe Local Privilege Escalation
6836| [83751] Microsoft Windows Terminal Services LCA Issued Certificates Arbitrary Binary Signing Weakness
6837| [83750] Microsoft Windows Gadgets Unspecified Remote Code Execution
6838| [83720] Microsoft .NET Framework Crafted Tilde (~) Request Resource Consumption Remote DoS
6839| [83672] Microsoft IE NTLM Authentication Remote Information Disclosure
6840| [83660] Microsoft Windows TLS Protocol HTTPS Session Decryption Information Disclosure
6841| [83659] Microsoft Windows win32k.sys Keyboard Layout Handling Local Privilege Escalation
6842| [83658] Microsoft Windows win32k.sys Hook Procedure Creation Incorrect Type Handling Local Privilege Escalation
6843| [83657] Microsoft Windows ADO Cachesize Data Access Components Memory Object Handling Overflow
6844| [83656] Microsoft Windows File / Directory Name Handling Remote Code Execution
6845| [83655] Microsoft Visual Basic for Applications Unspecified Path Subversion Arbitrary DLL Injection Code Execution
6846| [83654] Microsoft Office for Mac Insecure Permissions Arbitrary File Creation Local Privilege Escalation
6847| [83653] Microsoft IE Deleted Cached Object Handling Memory Corruption
6848| [83652] Microsoft IE Attribute Removal Handling Memory Corruption
6849| [83651] Microsoft SharePoint Reflected List Parameter Unspecified XSS
6850| [83650] Microsoft SharePoint scriptresx.ashx Unspecified XSS
6851| [83649] Microsoft SharePoint Arbitrary User Search Scope Manipulation
6852| [83648] Microsoft SharePoint Unspecified Arbitrary Site Redirect
6853| [83647] Microsoft SharePoint Username Unspecified XSS
6854| [83567] Microsoft NT Advanced Server (NTAS) FTP Client Pipe Character Arbitrary Command Execution
6855| [83545] Microsoft Outlook Web App owa/redir.aspx URL Parameter Arbitrary Site Redirect
6856| [83453] Microsoft Windows ProfileList Registry Key Permission Weakness User Profile Subversion
6857| [83439] Microsoft IE Long Unicode String Handling DoS
6858| [83388] Microsoft JET Database Engine (MS Access) ODBC API Crafted VBA String Remote Command Execution
6859| [83169] Microsoft Windows NT telnetd Service Port Scan Remote DoS
6860| [83126] Microsoft Windows NT Registry Plaintext Service Password Local Disclosure
6861| [82928] Microsoft Windows atmfd.dll OpenType Font (OTF) File Handling DoS
6862| [82873] Microsoft XML Core Services Uninitalized Memory Object Handling Remote Code Execution
6863| [82872] Microsoft IE Scrolling Events Cross-domain Remote Information Disclosure
6864| [82871] Microsoft IE OnRowsInserted Deleted Object Handling Memory Corruption
6865| [82870] Microsoft IE insertRow Deleted Object Handling Memory Corruption
6866| [82869] Microsoft IE insertAdjacentText Memory Location Accessing Memory Corruption
6867| [82868] Microsoft IE OnBeforeDeactivate Event Deleted Object Handling Memory Corruption
6868| [82867] Microsoft IE Title Element Change Deleted Object Handling Memory Corruption
6869| [82866] Microsoft IE Col Element Deleted Object Handling Memory Corruption
6870| [82865] Microsoft IE Same ID Property Deleted Object Handling Memory Corruption
6871| [82864] Microsoft IE Developer Toolbar Deleted Object Handling Memory Corruption
6872| [82863] Microsoft IE Null Byte Process Memory Remote Information Disclosure
6873| [82862] Microsoft IE EUC-JP Character Encoding XSS
6874| [82861] Microsoft IE HTML Sanitization String Handling Remote Information Disclosure
6875| [82860] Microsoft IE Center Element Deleted Object Handling Memory Corruption
6876| [82859] Microsoft .NET Framework Memory Access Function Pointer Handling Memory Corruption
6877| [82858] Microsoft Windows win32k.sys Thread Creation Attempt Handling Race Condition Local Privilege Escalation
6878| [82857] Microsoft Windows TrueType Font Loading Font Resource Reference Counter Handling Local Overflow
6879| [82856] Microsoft Windows win32k.sys Clipboard Format Atom Name Handling Local Privilege Escalation
6880| [82855] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1865)
6881| [82854] Microsoft Windows win32k.sys String Atom Class Name Handling Local Privilege Escalation (2012-1864)
6882| [82853] Microsoft Dynamics AX Enterprise Portal Unspecified XSS
6883| [82852] Microsoft Lync Unspecified Path Subversion Arbitrary DLL Injection Code Execution
6884| [82851] Microsoft Windows Remote Desktop Protocol (RDP) Memory Object Handling Remote Code Execution
6885| [82850] Microsoft Windows User Mode Scheduler Memory Corruption Local Privilege Escalation
6886| [82849] Microsoft Windows BIOS Memory Handling ROM Corruption Local Privilege Escalation
6887| [82693] Microsoft Windows Terminal Server Licensing Service MD5 Hash Collision Code Signing Spoofing
6888| [82605] Microsoft Windows Explorer Crafted Subdirectory Parent Directory Deletion Local DoS
6889| [82604] Microsoft Windows Media Player Streamed Broadcast Handling Remote Overflow
6890| [82565] Microsoft IE / Outlook OBJECT Handling Arbitrary File Access
6891| [82564] Microsoft Word WebView Crafted Metadata Handling Arbitrary Script Execution
6892| [82563] Microsoft Visual Studio WebViewFolderIcon ActiveX (MSCOMM32.OCX) Overflow
6893| [82562] Microsoft IE Cross-Origin Window Forced Navigation Weakness
6894| [82505] Microsoft Windows IE Instances Overflow Group Policy Bypass
6895| [82491] Microsoft Windows UTF Character Set File Extension Spoofing Weakness
6896| [82473] Microsoft WordPad DOC File Handling NULL Pointer Dereference DoS
6897| [82405] Microsoft ASP.NET Session ID Generation Entropy Weakness
6898| [81903] Microsoft Office X for Macintosh Registration Service Remote Overflow DoS
6899| [81736] Microsoft Windows GDI+ EMF File Record Handling Remote Code Execution
6900| [81735] Microsoft Windows Partition Manager (partmgr.sys) PnP Configuration Manager Function Call Handling Local Privilege Escalation
6901| [81734] Microsoft .NET Framework Untrusted User Input Serialization Remote Code Execution
6902| [81733] Microsoft .NET Framework Partially Trusted Assembly Object Serialization Remote Code Execution
6903| [81732] Microsoft Office RTF Data Handling Memory Corruption
6904| [81731] Microsoft Visio Viewer Attribute Validation Visio File Handling Memory Corruption
6905| [81730] Microsoft Windows tcpip.sys Outbound Packet Filtering Windows Firewall Bypass
6906| [81729] Microsoft Windows tcpip.sys Double-free IPv6 Address Binding Parsing Local Privilege Escalation
6907| [81728] Microsoft Office Excel Excel File Handling Memory Corruption
6908| [81727] Microsoft Office Excel OBJECTLINK Record Excel File Handling Memory Corruption
6909| [81726] Microsoft Office Excel Modified Bytes Excel File Handling Memory Corruption
6910| [81725] Microsoft Office Excel SLXI Record Excel File Handling Memory Corruption
6911| [81724] Microsoft Office Excel Type Mismatch Series Record Excel File Handling Memory Corruption
6912| [81723] Microsoft Office Excel MergeCells Record Excel File Handling Overflow
6913| [81722] Microsoft .NET Framework Buffer Allocation XBAP / .NET Application Handling Remote Code Execution
6914| [81721] Microsoft .NET Framework WPF Application Index Value Comparison Request Parsing Remote DoS
6915| [81720] Microsoft Windows t2embed.dll Module TTF File Handling Remote Code Execution
6916| [81719] Microsoft Office GDI+ Library Embedded EMF Image Office Document Handling Overflow
6917| [81718] Microsoft Silverlight Hebrew Unicode Engine XAML Glyph Rendering Double-free Remote Code Execution
6918| [81717] Microsoft Windows win32k.sys Scrollbar Calculation Handling Local Privilege Escalation
6919| [81716] Microsoft Windows win32k.sys Keyboard Layout File Handling Local Privilege Escalation
6920| [81715] Microsoft Windows win32k.sys Windows and Messages Handling Local Privilege Escalation
6921| [81699] Microsoft Windows xxxCreateWindowEx() Function Invalid Memory Access Local DoS
6922| [81331] Microsoft Visual Studio Incremental Linker (link.exe) ConvertRgImgSymToRgImgSymEx Function COFF Symbol Table Executable Handling Remote Overflow
6923| [81135] Microsoft Windows Authenticode Signature Verification Functionality Signed Portable Executable File Digest Validation Remote Code Execution
6924| [81134] Microsoft Multiple Product Works Converter WPS File Handling Remote Overflow
6925| [81133] Microsoft .NET Framework CRL (Common Language Runtime) Function Parameter Parsing Remote Code Execution
6926| [81132] Microsoft Forefront Unified Access Gateway Default Website Configuration External Network Information Disclosure
6927| [81131] Microsoft Forefront Unified Access Gateway UAG Server Arbitrary Site Redirect
6928| [81130] Microsoft IE vgx.dll VML Style Deleted Object Handling Remote Memory Corruption
6929| [81129] Microsoft IE SelectAll Deleted Object Handling Remote Memory Corruption
6930| [81128] Microsoft IE onReadyStateChange Event Deleted Object Handling Remote Memory Corruption
6931| [81127] Microsoft IE JScript9 Deleted Object Handling Remote Memory Corruption
6932| [81126] Microsoft IE Print Feature HTML Page Printing Remote Code Execution
6933| [81125] Microsoft Multiple Product MSCOMCTL.OCX Multiple Control Memory Corruption
6934| [81112] Microsoft SQL Server RESTORE DATABASE Command SQL Injection
6935| [80487] Microsoft Security Essentials Antimalware Engine Malformed CAB File Handling Scan Bypass
6936| [80443] Microsoft Security Essentials Antimalware Engine Malformed RAR File Handling Scan Bypass
6937| [80402] Microsoft Security Essentials Antimalware Engine Malformed TAR File Handling Scan Bypass
6938| [80376] Sophos Anti-Virus Malformed Microsoft Office File Handling Scan Bypass
6939| [80375] Comodo Antivirus Malformed Microsoft Office File Handling Scan Bypass
6940| [80174] Microsoft IE Protected Mode Bypass Low Integrity Process Handling Memory Corruption DoS
6941| [80173] Microsoft IE Unspecified Overflow
6942| [80006] Microsoft Visual Studio Add-In Loading Local Privilege Escalation
6943| [80005] Microsoft Windows DNS Server Domain Resource Record Query Parsing Remote DoS
6944| [80004] Microsoft Windows Remote Desktop Protocol Terminal Server RDP Packet Parsing Remote DoS
6945| [80003] Microsoft Windows DirectWrite Unicode Character Parsing Remote DoS
6946| [80002] Microsoft Windows win32k.sys PostMessage() Function Local Privilege Escalation
6947| [80001] Microsoft Expression Design Path Subversion Arbitrary DLL Injection Code Execution
6948| [80000] Microsoft Windows Remote Desktop Protocol Array Element Loading Handling Double-free Remote Code Execution
6949| [79442] Microsoft Windows Server 2008 DNS Server Service Cache Update Policy Deleted Domain Name Resolving Weakness
6950| [79269] Microsoft Windows win32k.sys Use-after-free Keyboard Layout Memory Dereference Local Privilege Escalation
6951| [79268] Microsoft IE Deleted Object VML Handling Remote Memory Corruption
6952| [79267] Microsoft IE String Creation NULL Byte Handling Process Memory Information Disclosure
6953| [79266] Microsoft IE Deleted Object HTML Layout Handling Remote Memory Corruption
6954| [79265] Microsoft IE Copy and Paste Cross-domain Information Disclosure
6955| [79264] Microsoft SharePoint wizardlist.aspx skey Parameter XSS
6956| [79263] Microsoft SharePoint themeweb.aspx Unspecified XSS
6957| [79262] Microsoft SharePoint inplview.aspx Unspecified XSS
6958| [79261] Microsoft .NET Framework / Silverlight Buffer Length Calculation XAML Browser Application Handling Remote Memory Corruption
6959| [79260] Microsoft .NET Framework / Silverlight Unmanaged Object XAML Browser Application Handling Remote Code Execution
6960| [79259] Microsoft Windows C Run-Time Library msvcrt.dll Meta File Handling Remote Overflow
6961| [79258] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0038)
6962| [79257] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0037)
6963| [79256] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0036)
6964| [79255] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0020)
6965| [79254] Microsoft Visio Viewer Unspecified Visio File Handling Remote Memory Corruption (2012-0019)
6966| [79253] Microsoft Windows Ancillary Function Driver (afd.sys) User Mode Input Parsing Local Privilege Escalation
6967| [79252] Microsoft Windows Ancillary Function Driver (afd.sys) AfdPoll User Mode Input Parsing Local Privilege Escalation
6968| [79192] Microsoft IE Javascript Dialog Origin Spoofing
6969| [79186] Microsoft IE onunload Location Field Overwrite
6970| [79173] Microsoft IE Image Control Title Attribute Status Bar Spoofing
6971| [79164] Microsoft IE about:blank Location Bar Overlay Phishing Weakness
6972| [79120] Microsoft Live Writer Path Subversion Arbitrary DLL Injection Code Execution
6973| [79118] Microsoft RDP Client Path Subversion Arbitrary DLL Injection Code Execution
6974| [79117] Microsoft Windows Program Group Path Subversion Arbitrary DLL Injection Code Execution
6975| [79116] Microsoft Snapshot Viewer Path Subversion Arbitrary DLL Injection Code Execution
6976| [79115] Microsoft MS Clip Book Viewer Path Subversion Arbitrary DLL Injection Code Execution
6977| [79114] Microsoft Clip Organizer Path Subversion Arbitrary DLL Injection Code Execution
6978| [79113] Microsoft Movie Maker Path Subversion Arbitrary DLL Injection Code Execution
6979| [79112] Microsoft Virtual PC Path Subversion Arbitrary DLL Injection Code Execution
6980| [78759] Microsoft Windows ICMPv6 Echo Request Remote Promiscuous Mode Detection
6981| [78738] Mozilla Multiple Products mImageBufferSize() Method image/vnd.microsoft.icon Image Encoding Information Disclosure
6982| [78212] Microsoft Windows Object Packager Path Subversion packager.exe Loading Remote Code Execution
6983| [78211] Microsoft Windows Line21 DirectShow Filter Media File Handling Remote Code Execution
6984| [78210] Microsoft Windows Multimedia Library (winmm.dll) MIDI File Handling Remote Code Execution
6985| [78209] Microsoft Windows Ntdll.dll Structured Exception Handling Tables Loading SafeSEH Security Bypass
6986| [78208] Microsoft AntiXSS Library Sanitization Module Escaped CSS Content Parsing XSS Weakness
6987| [78207] Microsoft Windows Embedded ClickOnce Application Office File Handling Remote Code Execution
6988| [78206] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Unicode Character Parsing Local Privilege Escalation
6989| [78057] Microsoft .NET Framework ASP.NET Hash Collision Web Form Post Parsing Remote DoS
6990| [78056] Microsoft .NET Framework Forms Authentication Sliding Expiry Cached Content Parsing Remote Code Execution
6991| [78055] Microsoft .NET Framework ASP.NET Username Parsing Authentication Bypass
6992| [78054] Microsoft .NET Framework Forms Authentication Return URL Handling Arbitrary Site Redirect
6993| [78010] Microsoft Windows Phone Text Message Parsing Remote DoS
6994| [77908] Microsoft Windows win32k.sys Safari IFRAME Height Attribute Handling Remote Memory Corruption
6995| [77675] Microsoft IE Content-Disposition Header Parsing Cross-Domain Remote Information Disclosure
6996| [77674] Microsoft IE Path Subversion Arbitrary DLL Injection Code Execution
6997| [77673] Microsoft IE XSS Filter Event Parsing Cross-Domain Remote Information Disclosure
6998| [77672] Microsoft Office Publisher Unspecified Publisher File Handling Remote Memory Corruption
6999| [77671] Microsoft Office Publisher Invalid Pointer Publisher File Handling Remote Memory Corruption
7000| [77670] Microsoft Office Publisher Array Indexing Publisher File Handling Remote Memory Corruption
7001| [77669] Microsoft Office Pinyin IME for Simplified Chinese Insecure Configuration Option Local Privilege Escalation
7002| [77668] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
7003| [77667] Microsoft Windows Active Directory Query Parsing Remote Overflow
7004| [77666] Microsoft Windows Kernel Exception Handler Local Privilege Escalation
7005| [77665] Microsoft Time ActiveX (DATIME.DLL) Unspecified IE Web Page Handling Remote Code Execution
7006| [77664] Microsoft Office PowerPoint OfficeArt Shape Record PowerPoint File Handling Remote Memory Corruption
7007| [77663] Microsoft Windows Object Linking and Embedding (OLE) Object File Handling Remote Code Execution
7008| [77662] Microsoft Windows CSRSS Device Event Message Parsing Local Privilege Escalation
7009| [77661] Microsoft Office Excel Record Parsing Object Handling Remote Memory Corruption
7010| [77660] Microsoft Windows Media Player / Center DVR-MS File Handling Remote Memory Corruption
7011| [77659] Microsoft Office Use-after-free Border Property Word Document Handling Remote Code Execution
7012| [77620] Microsoft Windows IE Sandbox Restriction Bypass Local Privilege Escalation
7013| [77606] Microsoft IE JavaScript Implementation getComputedStyle Method Page Handling Remote Information Disclosure
7014| [77537] Microsoft IE Cache Objects IFRAME Handling Browsing History Disclosure
7015| [77262] Microsoft Windows win32k.sys Driver Keyboard Layout File Handling Local DoS
7016| [77228] Microsoft Outlook Client Large Header Handling Message Body Content Injection
7017| [77213] Microsoft Windows AppLocker Rule Weakness Local Access Restriction Bypass
7018| [76902] Microsoft Windows Active Directory LDAPS CRL Handling Weakness Authentication Bypass
7019| [76901] Microsoft Windows Mail / Windows Meeting Space Path Subversion Arbitrary DLL Injection Code Execution
7020| [76900] Microsoft Windows Malformed TrueType Font Parsing DoS
7021| [76899] Microsoft Windows TCP/IP Reference Counter Crafted UDP Packet Stream Remote Overflow
7022| [76843] Microsoft Windows Win32k TrueType Font Handling Privilege Escalation
7023| [76460] Microsoft Office Publisher pubconv.dll PUB File Handling Overflow
7024| [76236] Microsoft Forefront Unified Access Gateway MicrosoftClient.jar JAR File Code Execution
7025| [76235] Microsoft Forefront Unified Access Gateway ExcelTables Response Splitting Unspecified XSS
7026| [76234] Microsoft Forefront Unified Access Gateway Unspecified XSS
7027| [76233] Microsoft Forefront Unified Access Gateway ExcelTables Unspecified XSS
7028| [76232] Microsoft Windows Ancillary Function Driver afd.sys Local Privilege Escalation
7029| [76231] Microsoft Windows Active Accessibility Path Subversion Arbitrary DLL Injection Code Execution
7030| [76224] Microsoft Host Integration Server Multiple Process Request Parsing Remote Memory Corruption DoS
7031| [76223] Microsoft Host Integration Server Multiple Process Request Parsing Infinite Loop Remote DoS
7032| [76221] Microsoft Windows win32k.sys Driver Use-after-free Driver Object Handling Arbitrary Code Execution
7033| [76220] Microsoft Windows win32k.sys Driver .fon Font File Handling Overflow
7034| [76219] Microsoft Windows win32k.sys Driver Type Translation TrueType Font File Handling DoS
7035| [76218] Microsoft Windows win32k.sys Driver NULL Dereference Unspecified Arbitrary Code Execution
7036| [76214] Microsoft .NET Framework / Silverlight Class Inheritance Restriction Web Page Handling Remote Code Execution
7037| [76213] Microsoft IE Virtual Function Table Corruption mshtml.dll Extra Size Index Handling Remote Code Execution
7038| [76212] Microsoft IE Use-after-free swapNode() Method Body Element Handling Remote Code Execution
7039| [76211] Microsoft IE Select Element Handling Uninitialized Object Access Remote Memory Corruption
7040| [76210] Microsoft IE Jscript9.dll Uninitialized Object Access Remote Memory Corruption
7041| [76209] Microsoft IE Use-after-free OnLoad Event Handling Remote Code Execution
7042| [76208] Microsoft IE Use-after-free Type-Safety Weakness Option Element Handling Remote Code Execution
7043| [76207] Microsoft IE OLEAuto32.dll Uninitialized Object Access Remote Memory Corruption
7044| [76206] Microsoft IE Use-after-free Scroll Event Handling Remote Code Execution
7045| [76205] Microsoft Windows Media Center Path Subversion Arbitrary DLL Injection Code Execution
7046| [75511] Microsoft HTML Help itss.dll CHM File Handling Overflow
7047| [75473] Microsoft Windows Explorer shmedia.dll AVI File Handling Remote DoS
7048| [75444] Microsoft Windows WINS Loopback Interface Crafted Packet Local Privilege Escalation
7049| [75394] Microsoft SharePoint Source Parameter Arbitrary Site Redirect
7050| [75393] Microsoft SharePoint Unspecified URI XSS
7051| [75391] Microsoft SharePoint Contact Details XSS
7052| [75390] Microsoft SharePoint EditForm.aspx XSS
7053| [75389] Microsoft SharePoint SharePoint Calendar URI XSS
7054| [75387] Microsoft Office Excel Unspecified Signedness Error Excel File Handling Memory Corruption
7055| [75386] Microsoft Office Excel Unspecified Conditional Expression Parsing Excel File Handling Memory Corruption
7056| [75385] Microsoft Office Excel Unspecified Excel File Record Handling Memory Corruption
7057| [75384] Microsoft Office Excel Unspecified Array-Indexing Weakness Excel File Handling Memory Corruption
7058| [75383] Microsoft Office Excel Unspecified Use-after-free Memory Dereference Excel File Handling Remote Code Execution
7059| [75382] Microsoft Windows Shell Extensions Path Subversion Arbitrary DLL Injection Code Execution
7060| [75381] Microsoft SharePoint XML / XSL File Handling Unspecified Arbitrary File Disclosure
7061| [75380] Microsoft Office MSO.dll Object Pointer Dereference Word Document Handling Remote Code Execution
7062| [75379] Microsoft Office MSO.dll Path Subversion Arbitrary DLL Injection Code Execution
7063| [75271] Microsoft SilverLight DataGrid Memory Leak Multiple Element Remote DoS
7064| [75269] Microsoft Silverlight DependencyProperty Property Handling Remote DoS
7065| [75260] Microsoft Windows IPv6 Router Advertisement (RA) MitM Weakness
7066| [75250] Microsoft IE Unspecified Remote Code Execution
7067| [75199] Intel G41 Driver for Microsoft Windows Unspecified Page Handling DoS
7068| [75197] NVIDIA Geforce 310 Driver on Microsoft Windows Unspecified Page Handling DoS
7069| [75195] Microsoft Windows GPU Support Functionality Unspecified Page Handling DoS
7070| [75030] Microsoft msxml.dll xsltGenerateIdFunction Heap Memory Address Disclosure Weakness
7071| [74500] Microsoft IE STYLE Object Parsing Memory Corruption
7072| [74499] Microsoft IE SetViewSlave() Function XSLT Object Markup Reloading Memory Corruption
7073| [74498] Microsoft IE Shift JIS Character Sequence Parsing Cross-domain Remote Information Disclosure
7074| [74497] Microsoft IE Event Handler Cross-domain Remote Information Disclosure
7075| [74496] Microsoft IE Protected Mode Bypass Arbitrary File Creation
7076| [74495] Microsoft IE window.open() Function Race Condition Memory Corruption
7077| [74494] Microsoft IE Crafted Link Telnet URI Handler Remote Program Execution
7078| [74483] Microsoft Windows TCP/IP Stack (Tcpip.sys) QoS URL Request Parsing Remote DoS
7079| [74482] Microsoft Windows TCP/IP Stack (Tcpip.sys) ICMP Message Parsing Remote DoS
7080| [74450] Microsoft IE HTTPS Session HTTP Set-Cookie Header HSTS includeSubDomains Weakness MiTM Arbitrary Cookie Overwrite
7081| [74408] Microsoft Windows Data Access Tracing Component Path Subversion Arbitrary DLL Injection Code Execution
7082| [74407] Microsoft Windows Kernel File Metadata Handling Remote DoS
7083| [74406] Microsoft Windows Remote Desktop Web Access Logon Page Unspecified XSS
7084| [74405] Microsoft Windows Remote Desktop Protocol RDP Packet Parsing Remote DoS
7085| [74404] Microsoft .NET Framework System.Net.Sockets Code Access Security Bypass Information Disclosure
7086| [74403] Microsoft .NET Framework Chart Control Special URI Character GET Request Parsing Remote Information Disclosure
7087| [74402] Microsoft Windows Remote Access Service NDISTAPI Driver User Input Validation Weakness Local Privilege Escalation
7088| [74401] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Inter-Process Device Event Message Parsing Local Privilege Escalation
7089| [74400] Microsoft Windows DNS Service Non-Existent Domain Query Parsing Remote DoS
7090| [74399] Microsoft Windows DNS Service NAPTR Query Parsing Overflow
7091| [74398] Microsoft Visio Move Around the Block Visio File Handling Remote Code Execution
7092| [74397] Microsoft Visio pStream Release Visio File Handling Remote Code Execution
7093| [74396] Microsoft Report Viewer Control Unspecified XSS
7094| [74265] Microsoft Windows CSRSS winsrv.dll SrvGetConsoleTitle() Function Type Casting Weakness Local DoS
7095| [74052] Microsoft IE EUC-JP Encoding Unspecified XSS
7096| [73880] ArcSight Connector Appliance Windows Event Log SmartConnector Microsoft OS Version Field XSS
7097| [73799] Microsoft Windows Bluetooth Driver Object Handling Remote Code Execution
7098| [73796] Microsoft Windows CSRSS SrvSetConsoleLocalEUDC() Function NULL Page Data Write Local Privilege Escalation
7099| [73795] Microsoft Windows CSRSS SrvWriteConsoleOutputString() Function Local Overflow
7100| [73794] Microsoft Windows CSRSS SrvWriteConsoleOutput() Function Local Overflow
7101| [73793] Microsoft Windows CSRSS SrvSetConsoleNumberOfCommand() Function Kernel Memory Access Local Privilege Escalation
7102| [73792] Microsoft Windows CSRSS AllocConsole() Function Multiple Console Object Orphaning Local Privilege Escalation
7103| [73791] Microsoft Windows win32k.sys Driver Function Argument Validation Unspecified Local Information Disclosure
7104| [73790] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1888)
7105| [73789] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1887)
7106| [73788] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1885)
7107| [73787] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1881)
7108| [73786] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1880)
7109| [73785] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1875)
7110| [73784] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1884)
7111| [73783] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1883)
7112| [73782] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1882)
7113| [73781] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1879)
7114| [73780] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1878)
7115| [73779] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1877)
7116| [73778] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1876)
7117| [73777] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1874)
7118| [73670] Microsoft IE XSLT Heap Memory Address Information Disclosure
7119| [73660] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
7120| [73654] Microsoft Windows fxsst.dll Path Subversion DLL Injection Code Execution
7121| [73602] Microsoft Windows nsiproxy.sys Local DoS
7122| [73380] Microsoft Lync Web Components Server Reach/Client/WebPages/ReachJoin.aspx reachLocale Parameter XSS
7123| [73372] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
7124| [73100] Microsoft Word Insufficient Pointer Validation Memory Corruption
7125| [72960] Microsoft SMB Client Response Handling Remote Code Execution
7126| [72959] Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution
7127| [72955] Microsoft Windows Ancillary Function Driver Local Privilege Escalation
7128| [72954] Microsoft IE Vector Markup Language (VML) Object Handling Memory Corruption
7129| [72953] Microsoft IE MIME Sniffing Information Disclosure
7130| [72952] Microsoft IE CDL Protocol 302 HTTP Redirect Memory Corruption
7131| [72951] Microsoft IE selection.empty JavaScript Statement onclick Event Memory Corruption
7132| [72950] Microsoft IE layout-grid-char Style Property Handling Memory Corruption
7133| [72949] Microsoft IE Drag and Drop Information Disclosure
7134| [72948] Microsoft IE Multiple JavaScript Modifications DOM Manipulation Memory Corruption
7135| [72947] Microsoft IE Time Element Memory Corruption
7136| [72946] Microsoft IE Drag and Drop Memory Corruption
7137| [72944] Microsoft IE SafeHTML Function XSS
7138| [72943] Microsoft IE vgx.dll imagedata VML Object DOM Modification Memory Corruption
7139| [72942] Microsoft IE Link Properties Handling Memory Corruption
7140| [72937] Microsoft Windows Active Directory Certificate Services Web Enrollment XSS
7141| [72936] Microsoft Windows Server Service Crafted SMB Request Parsing Remote DoS
7142| [72935] Microsoft Windows MHTML Mime-Formatted Request Unspecified XSS
7143| [72934] Microsoft XML Editor External Entities Resolution Unspecified Information Disclosure
7144| [72933] Microsoft Forefront Threat Management Gateway (TMG) Firewall Client Winsock Provider Remote Code Execution
7145| [72932] Microsoft .NET Framework JIT Object Validation Arbitrary Code Execution
7146| [72931] Microsoft .NET Framework / Silverlight Array Offset Remote Code Execution
7147| [72930] Microsoft Windows Hyper-V VMBus vmswitch.sys Crafted Packet Cross-guest Local DoS
7148| [72929] Microsoft Windows Distributed File System (DFS) Referral Response Handling Remote DoS
7149| [72928] Microsoft Windows Distributed File System (DFS) Response Handling Memory Corruption Remote Code Execution
7150| [72927] Microsoft Office Excel Out of Bounds WriteAV Unspecified Arbitrary Code Execution
7151| [72926] Microsoft Office Excel WriteAV Unspecified Arbitrary Code Execution
7152| [72925] Microsoft Office Excel File Handling Unspecified Memory Corruption
7153| [72924] Microsoft Office Excel File Handling Unspecified Buffer Overflow
7154| [72923] Microsoft Office Excel Unspecified Memory Heap Overwrite Arbitrary Code Execution
7155| [72922] Microsoft Office Excel Out of Bounds Array Access Unspecified Arbitrary Code Execution
7156| [72921] Microsoft Office Excel Improper Record Parsing Unspecified Arbitrary Code Execution
7157| [72920] Microsoft Office Excel Insufficient Record Validation Unspecified Arbitrary Code Execution
7158| [72919] Microsoft Windows OpenType Font (OTF) Pointer Validation Arbitrary Code Execution
7159| [72724] Microsoft IE Cookie Jacking Account Authentication Bypass
7160| [72696] Microsoft Reader AOLL Chunk Array Overflow
7161| [72695] Microsoft Reader ITLS Header Piece Handling Overflow
7162| [72688] Microsoft IE CEnroll tar.setPendingRequestInfo Remote DoS
7163| [72687] Microsoft Reader aud_file.dll Audible Audio File Handling Null Byte Memory Corruption
7164| [72686] Microsoft Reader msreader.exe Integer Underflow LIT File Handling Overflow
7165| [72685] Microsoft Reader msreader.exe LIT File Handling Overflow
7166| [72680] Microsoft IE UTF-7 Local Redirection XSS
7167| [72679] Microsoft IE Tags javascript:[jscodz] XSS
7168| [72677] Microsoft IE Mime-Sniffing Content-Type Handling Weakness
7169| [72676] Microsoft Windows Kernel-mode GS Cookie Entropy Weakness
7170| [72674] Microsoft IE img Tag Cross-domain Cookie Disclosure
7171| [72672] Microsoft Windows AppFix systest.sdb Local DoS
7172| [72671] Microsoft Excel Spreadsheet Printing Memory Cleartext PIN Disclosure
7173| [72670] Microsoft Windows Server 2003 ActiveDirectory BROWSER ELECTION Remote Overflow
7174| [72236] Microsoft Office PowerPoint Presentation Parsing Unspecified Overflow
7175| [72235] Microsoft Office PowerPoint File Handling Unspecified Memory Corruption
7176| [72234] Microsoft Windows WINS Service Failed Response Data Reuse Memory Corruption Remote Code Execution
7177| [71788] Microsoft Windows Messenger ActiveX Unspecified Remote Code Execution
7178| [71782] Microsoft .NET Framework x86 JIT Compiler XAML Browser Application (XBAP) Processing Stack Corruption
7179| [71781] Microsoft Windows SMB Transaction Parsing Unspecified Remote Code Execution
7180| [71780] Microsoft Windows DNS Client Service LLMNR Query Processing Remote Code Execution
7181| [71779] Microsoft Windows/Office GDI+ (gdiplus.dll) EMF File Processing Overflow
7182| [71778] Microsoft Windows Wordpad Word 97 Converter sprmTTextFlow / sprmTSplit PRLs Parsing Memory Corruption
7183| [71777] Microsoft IE Frame Tag Handling Information Disclosure
7184| [71776] Microsoft Windows OpenType Font (OTF) Driver Font Processing Overflow
7185| [71775] Microsoft Windows Fax Cover Page Editor fxscover.exe Text Element Handling Memory Corruption
7186| [71774] Microsoft Windows JScript / VBScript Engine Scripting Memory Reallocation Overflow
7187| [71773] Microsoft Windows Common Internet File System (CIFS) Malformed Browser Message Handling Overflow
7188| [71772] Microsoft Windows SMB Client Response Parsing Unspecified Remote Code Execution
7189| [71771] Microsoft Office PowerPoint TimeColorBehaviorContainer (Techno-color Time Bandit) Floating Point Processing Remote Code Execution
7190| [71770] Microsoft Office PowerPoint PersistDirectoryEntry Processing Remote Code Execution
7191| [71769] Microsoft Office PowerPoint OfficeArt Atom Parsing Remote Code Execution
7192| [71767] Microsoft Office Path Subversion Arbitrary DLL Injection Code Execution
7193| [71766] Microsoft Office Excel RealTimeData Record Parsing WriteAV Remote Code Execution
7194| [71765] Microsoft Office Excel File Validation Record Handling Overflow
7195| [71761] Microsoft Office Excel File Handling Memory Corruption
7196| [71760] Microsoft Office Excel File Handling Unspecified Memory Corruption
7197| [71759] Microsoft Office Excel External Record Parsing Signedness Overflow
7198| [71758] Microsoft Office Excel Substream Parsing Integer Underflow
7199| [71757] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1242)
7200| [71756] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1241)
7201| [71755] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1240)
7202| [71754] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1239)
7203| [71753] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1238)
7204| [71752] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1237)
7205| [71751] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1236)
7206| [71750] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1235)
7207| [71749] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-1234)
7208| [71748] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0675)
7209| [71747] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0674)
7210| [71746] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0672)
7211| [71745] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0671)
7212| [71744] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0670)
7213| [71743] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0667)
7214| [71742] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0666)
7215| [71741] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0665)
7216| [71740] Microsoft Windows win32k.sys Driver Use After Free Unspecified Local Privilege Escalation (2011-0662)
7217| [71739] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1233)
7218| [71738] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1232)
7219| [71737] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1231)
7220| [71736] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1230)
7221| [71735] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1229)
7222| [71734] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1228)
7223| [71732] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1227)
7224| [71731] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1226)
7225| [71730] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-1225)
7226| [71729] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0677)
7227| [71728] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0676)
7228| [71727] Microsoft Windows win32k.sys Driver NULL Pointer De-reference Unspecified Local Privilege Escalation (2011-0673)
7229| [71726] Microsoft IE JavaScript Unspecified Cross-domain Information Disclosure
7230| [71725] Microsoft IE Object Management onPropertyManagement Processing Memory Corruption
7231| [71724] Microsoft IE Layouts Handling Memory Corruption
7232| [71670] Microsoft IE Pop-up Window Address Bar Spoofing Weakness
7233| [71668] Microsoft Visual Studio CPFE.DLL Malformed Source File Handling DoS
7234| [71667] Microsoft Windows SetDllDirectory Function Binary Planting Protection Bypass
7235| [71665] Microsoft .NET Framework on XP KB982671 Persistent Firewall Disablement
7236| [71594] Microsoft IE JavaScript Math.random Implementation Seed Reconstruction Weakness
7237| [71086] Microsoft Visual Studio MFC Applications Path Subversion Arbitrary DLL Injection Code Execution
7238| [71017] Microsoft Malware Protection Engine (MMPE) Crafted Registry Key Local Privilege Escalation
7239| [71016] Microsoft Windows Media Player / Center .dvr-ms File Handling Arbitrary Code Execution
7240| [71015] Microsoft Windows DirectShow Path Subversion Arbitrary DLL Injection Code Execution
7241| [71014] Microsoft Windows Remote Desktop Client Path Subversion Arbitrary DLL Injection Code Execution
7242| [70904] Microsoft Office Excel OfficeArt Container Parsing Memory Corruption
7243| [70885] Microsoft Windows LSASS Authentication Request Privilege Escalation
7244| [70881] Microsoft Windows SMB Browser Election Request Server Name String Overflow
7245| [70835] Microsoft Windows Kerberos Authentication Downgrade Weakness
7246| [70834] Microsoft Windows Kerberos Unkeyed Checksum Hashing Mechanism Service Ticket Forgery
7247| [70833] Microsoft IE Insecure Library Loading Remote Code Execution
7248| [70832] Microsoft IE mshtml.dll Dangling Pointer Memory Corruption Remote Code Execution
7249| [70831] Microsoft IE Uninitialized Memory Corruption Remote Code Execution (2011-0035)
7250| [70829] Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code Execution
7251| [70828] Microsoft Visio LZW Stream Decompression Exception Remote Code Execution
7252| [70827] Microsoft Windows JScript / VBScript Scripting Engine Memory Corruption Information Disclosure
7253| [70826] Microsoft Windows CSRSS Logoff Process Termination Local Information Disclosure
7254| [70825] Microsoft Windows Server Active Directory Server Principal Name (SPN) Handling Remote DoS
7255| [70823] Microsoft Windows Kernel Trace Event (WmiTraceMessageVa) Handling Integer Truncation Local Privilege Escalation
7256| [70821] Microsoft OpenType Compact Font Format (CFF) Parsing Remote Code Execution
7257| [70819] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0087)
7258| [70818] Microsoft Windows Kernel Unspecified User Input Validation Weakness Local Privilege Escalation (2011-0086)
7259| [70817] Microsoft Windows Kernel Class Improper Pointer Validation Unspecified Local Privilege Escalation
7260| [70816] Microsoft Windows Kernel Window Class Pointer Confusion Unspecified Local Privilege Escalation
7261| [70814] Microsoft Windows Kernel Unspecified Memory Corruption Local Privilege Escalation
7262| [70813] Microsoft Office PowerPoint OfficeArt Container Parsing Remote Code Execution
7263| [70812] Microsoft Office Excel Invalid Object Type Handling Remote Code Execution
7264| [70811] Microsoft Office Excel Axis Properties Record Parsing Overflow
7265| [70810] Microsoft Office Excel Drawing File Format Shape Data Parsing Use-after-free Arbitrary Code Execution
7266| [70693] Microsoft Windows MHTML Protocol Handler MIME Formatted Request XSS
7267| [70689] Microsoft Windows USB Human Interface Device Functionality Warning Weakness Arbitrary Program Execution
7268| [70444] Microsoft Data Access Components (MDAC / WDAC) MSADO Record CacheSize Handling Remote Code Execution
7269| [70443] Microsoft Data Access Components (MDAC / WDAC) ODBC API (odbc32.dll) SQLConnectW Function DSN / szDSN Argument Handling Overflow
7270| [70392] Microsoft IE DOM Implementation cross_fuzz GUI Display Weakness
7271| [70391] Microsoft IE MSHTML.DLL ReleaseInterface Function Use-after-free Arbitrary Code Execution
7272| [70390] Microsoft Windows IPv6 Stack Neighbor Discovery Router Advertisement Message Saturation Remote DoS
7273| [70263] Microsoft Windows Bitmap Thumbnail shimgvw.dll CreateSizedDIBSECTION() Function biClrUsed Parameter Overflow
7274| [70126] Microsoft Windows Fax Cover Page Editor CDrawPoly::Serialize() Function Overflow
7275| [70000] Microsoft Windows Remote Access Phonebook (rasphone.exe) Path Subversion Arbitrary EXE Injection Code Execution
7276| [69942] Microsoft WMI Administrative Tools WEBSingleView.ocx ActiveX Remote Code Execution
7277| [69830] Microsoft IE Cross-Domain Information Disclosure (2010-3348)
7278| [69829] Microsoft IE HTML+Time Element outerText Memory Corruption
7279| [69828] Microsoft IE Recursive Select Element Remote Code Execution
7280| [69827] Microsoft IE Animation HTML Object Memory Corruption (2010-3343)
7281| [69826] Microsoft IE Cross-Domain Information Disclosure (2010-3342)
7282| [69825] Microsoft IE HTML Object Memory Corruption (2010-3340)
7283| [69824] Microsoft Windows Consent User Interface Local Privilege Escalation
7284| [69823] Microsoft Windows Routing and Remote Access NDProxy Unspecified Local Code Execution
7285| [69822] Microsoft Windows OpenType Font Driver CMAP Table Parsing Arbitrary Code Execution
7286| [69821] Microsoft Windows OpenType Font Driver Pointer Handling Double-free Arbitrary Code Execution
7287| [69820] Microsoft Windows OpenType Font Driver Index Array Unspecified Code Execution
7288| [69819] Microsoft Windows Netlogon RPC Service Crafted Request Remote DoS
7289| [69818] Microsoft Windows Hyper-V VMBus Crafted Packet Local DoS
7290| [69817] Microsoft SharePoint Office Document Load Balancer Crafted SOAP Request Remote Code Execution
7291| [69816] Microsoft Windows BranchCache Path Subversion Arbitrary DLL Injection Code Execution
7292| [69815] Microsoft Office Publisher Array Indexing Memory Corruption
7293| [69814] Microsoft Office Publisher Malformed PUB File Handling Memory Corruption
7294| [69813] Microsoft Office Publisher pubconv.dll Array Indexing Memory Corruption
7295| [69812] Microsoft Office Publisher pubconv.dll Unspecified Heap Overrun
7296| [69811] Microsoft Office Publisher pubconv.dll Size Value Handling Heap Corruption
7297| [69810] Microsoft Exchange Server store.exe Malformed MAPI Request Infinite Loop Remote DoS
7298| [69809] Microsoft Office FlashPix Image Converter Tile Data Handling Heap Corruption
7299| [69808] Microsoft Office FlashPix Image Converter Picture Set Processing Overflow
7300| [69807] Microsoft Office Document Imaging Endian Conversion TIFF Image Handling Memory Corruption
7301| [69806] Microsoft Office TIFF Image Converter Endian Conversion Buffer Overflow
7302| [69805] Microsoft Office TIFF Import/Export Graphic Filter Converter Multiple Overflows
7303| [69804] Microsoft Office PICT Image Converter Overflow
7304| [69803] Microsoft Office CGM Image Converter Overflow
7305| [69802] Microsoft Windows win32k.sys Cursor Linking Unspecified Local Privilege Escalation
7306| [69801] Microsoft Windows win32k.sys WriteAV Unspecified Local Privilege Escalation
7307| [69800] Microsoft Windows win32k.sys Unspecified Double-free Local Privilege Escalation
7308| [69799] Microsoft Windows win32k.sys PFE Pointer Double-free Local Privilege Escalation
7309| [69798] Microsoft Windows win32k.sys Unspecified Memory Corruption Local Privilege Escalation
7310| [69797] Microsoft Windows win32k.sys Unspecified Local Overflow
7311| [69796] Microsoft IE CSS Parser mshtml.dll CSharedStyleSheet::Notify Function Use-after-free Remote Code Execution
7312| [69501] Microsoft Windows win32k.sys Driver GreEnableEUDC() Function Local Overflow
7313| [69465] Microsoft Windows win32k.sys NtGdiEnableEUDC Local Overflow Privilege Escalation
7314| [69311] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
7315| [69095] Microsoft Forefront Unified Access Gateway (UAG) Signurl.asp XSS
7316| [69094] Microsoft Forefront Unified Access Gateway (UAG) Mobile Portal Website Unspecified XSS
7317| [69093] Microsoft Forefront Unified Access Gateway (UAG) EOP Unspecified XSS
7318| [69092] Microsoft Forefront Unified Access Gateway (UAG) Redirection Spoofing Weakness
7319| [69091] Microsoft Office PowerPoint File Animation Node Parsing Underflow Heap Corruption
7320| [69090] Microsoft Office PowerPoint 95 File Parsing Overflow
7321| [69089] Microsoft Office Insecure Library Loading Remote Code Execution
7322| [69088] Microsoft Office MSO Large SPID Read AV Remote Code Execution
7323| [69087] Microsoft Office Drawing Exception Handling Remote Code Execution
7324| [69086] Microsoft Office Art Drawing Record Parsing Remote Code Execution
7325| [69085] Microsoft Office 2010 RTF File Handling pFragments Buffer Overflow Arbitrary Code Execution
7326| [68987] Microsoft IE mshtml CSS Tag Use-after-free Memory Corruption
7327| [68946] Microsoft Windows DAO Object Library Path Subversion Arbitrary DLL Injection Code Execution
7328| [68933] Microsoft Windows Shell32.dll Environment Variable Expansion SetDllDirectory Function Bypass
7329| [68857] Microsoft Windows XP wscript.exe Path Subversion Arbitrary DLL Injection Code Execution
7330| [68855] Microsoft IE window.onerror Error Handling URL Destination Information Disclosure
7331| [68586] Microsoft Windows LRPC Server LPC Message Handling Local Privilege Escalation
7332| [68585] Microsoft Foundation Classes (MFC) Library Window Title Handling Remote Overflow
7333| [68584] Microsoft Office Word Uninitialized Pointer Handling Remote Code Execution
7334| [68583] Microsoft Office Word Unspecified Boundary Check Remote Code Execution
7335| [68582] Microsoft Office Word Array Index Value Handling Unspecified Remote Code Execution
7336| [68581] Microsoft Office Word File Unspecified Structure Handling Stack Overflow
7337| [68580] Microsoft Office Word Return Value Handling Unspecified Remote Code Execution
7338| [68579] Microsoft Office Word Bookmark Handling Invalid Pointer Remote Code Execution
7339| [68578] Microsoft Office Word Pointer LFO Parsing Double-free Remote Code Execution
7340| [68577] Microsoft Office Word Malformed Record Handling Remote Heap Overflow
7341| [68576] Microsoft Office Word BKF Object Parsing Array Indexing Remote Code Execution
7342| [68575] Microsoft Office Word File LVL Structure Parsing Remote Code Execution
7343| [68574] Microsoft Office Word File Record Parsing Unspecified Memory Corruption
7344| [68573] Microsoft Office Excel File Unspecified Record Parsing Remote Integer Overflow
7345| [68572] Microsoft Office Excel Formula Record Parsing Memory Corruption (2010-3231)
7346| [68571] Microsoft Office Excel File Format Parsing Remote Code Execution
7347| [68569] Microsoft Office Excel Formula Substream Record Parsing Memory Corruption
7348| [68568] Microsoft Office Excel Formula Biff Record Parsing Remote Code Execution
7349| [68567] Microsoft Office Excel Out Of Bounds Array Handling Remote Code Execution
7350| [68566] Microsoft Office Excel Merge Cell Record Pointer Handling Remote Code Execution
7351| [68565] Microsoft Office Excel Negative Future Function Parsing Remote Code Execution
7352| [68564] Microsoft Office Excel PtgExtraArray Structure Parsing Remote Code Execution
7353| [68563] Microsoft Office Excel RealTimeData Record Array Parsing Remote Code Execution
7354| [68562] Microsoft Office Excel Out-of-Bounds Memory Write in Parsing Memory Corruption
7355| [68561] Microsoft Office Excel Ghost Record Type Parsing Remote Code Execution
7356| [68560] Microsoft Windows SChannel TLSv1 Crafted Client Certificate Request DoS
7357| [68559] Microsoft Windows OpenType Font Parsing Unspecified Remote Code Execution
7358| [68558] Microsoft Windows OpenType Malformed Font Validation Remote Code Execution
7359| [68557] Microsoft Windows Media Player Reload Operation Object Deallocation Memory Corruption
7360| [68556] Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Code Execution
7361| [68554] Microsoft Windows Server 2008 Shared Cluster Disks Addition Default Permission Weakness
7362| [68553] Microsoft Windows t2embed.dll Embedded OpenType Font Parsing hdmx Record Parsing Overflow
7363| [68552] Microsoft Windows win32k.sys Driver Keyboard Layout Loading Local Privilege Escalation
7364| [68551] Microsoft Windows win32k.sys Driver Window Class Data Validation Local Privilege Escalation
7365| [68550] Microsoft Windows Media Player Network Sharing Service RTSP Use-after-free Remote Code Execution
7366| [68549] Microsoft Windows Common Control Library (comctl32.dll) Third-party SVG Content Handling Overflow
7367| [68548] Microsoft IE / SharePoint Unspecified XSS
7368| [68547] Microsoft IE CSS Special Character Processing Unspecified Information Disclosure
7369| [68546] Microsoft IE Object Handling Unspecified Memory Corruption (2010-3326)
7370| [68545] Microsoft IE Anchor Element Handling Unspecified Information Disclosure
7371| [68544] Microsoft IE AutoComplete Functionality Unspecified Information Disclosure
7372| [68543] Microsoft IE HtmlDlgHelper Class Object Handling Memory Corruption
7373| [68542] Microsoft IE CSS imports() Cross-domain Information Disclosure
7374| [68541] Microsoft IE mshtml.dll CAttrArray::PrivateFind Function Object Handling Memory Corruption
7375| [68540] Microsoft IE mshtml.dll Object Handling Uninitialized Memory Corruption (2010-3331)
7376| [68532] Microsoft Windows rpcrt4.dll LRPC_SCALL::SendRequest() Function LPC Message Local Overflow DoS
7377| [68518] Microsoft Windows on 32-bit Task Scheduler Crafted Application Local Privilege Escalation
7378| [68517] Microsoft Windows on 32-bit win32k.sys Keyboard Layout Loading Local Privilege Escalation
7379| [68438] Microsoft XSS Filter Library Bypass
7380| [68151] Microsoft Office Word MSO.dll Crafted Document Buffer NULL Dereference DoS
7381| [68127] Microsoft ASP.NET ViewState Cryptographic Padding Remote Information Disclosure
7382| [68123] Microsoft IE / SharePoint toStaticHTML Function Crafted CSS @import Rule XSS Protection Mechanism Bypass
7383| [67988] Microsoft Windows Print Spooler Service RPC Impersonation StartDocPrinter Procedure Remote Code Execution
7384| [67987] Microsoft Windows LSASS Implementation Malformed LDAP Message Handling Remote Overflow
7385| [67986] Microsoft Windows Client/Server Runtime Subsystem (CSRSS) Local Privilege Escalation
7386| [67985] Microsoft Windows MPEG-4 Codec Content Parsing Overflow
7387| [67984] Microsoft Multiple Products Unicode Scripts Processor (Usp10.dll) OpenType Font Processing Memory Corruption
7388| [67983] Microsoft Windows WordPad Text Converters Document Parsing Memory Corruption
7389| [67982] Microsoft Outlook E-mail Content Parsing Remote Overflow
7390| [67981] Microsoft Windows RPC Response Processing Remote Memory Corruption
7391| [67977] Microsoft Visual C++ Redistributable Path Subversion Arbitrary DLL Injection Code Execution
7392| [67834] Microsoft IE Cross-Origin CSS Style Sheet Handling Information Disclosure
7393| [67784] Microsoft Windows Media Encoder Path Subversion Arbitrary DLL Injection Code Execution
7394| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
7395| [67722] Microsoft Windows Internet Connection Signup Wizard Path Subversion Arbitrary DLL Injection Code Execution
7396| [67600] Microsoft Windows Media Player Path Subversion Arbitrary DLL Injection Code Execution
7397| [67599] Microsoft Windows Live Messenger Path Subversion Arbitrary DLL Injection Code Execution
7398| [67598] Microsoft Office OneNote Path Subversion Arbitrary DLL Injection Code Execution
7399| [67597] Microsoft Office Word Path Subversion Arbitrary DLL Injection Code Execution
7400| [67596] Microsoft Office Excel Path Subversion Arbitrary DLL Injection Code Execution
7401| [67595] Microsoft Office Access Path Subversion Arbitrary DLL Injection Code Execution
7402| [67594] Microsoft Outlook Path Subversion Arbitrary DLL Injection Code Execution
7403| [67553] Microsoft Windows Contacts Path Subversion Arbitrary DLL Injection Code Execution
7404| [67552] Microsoft Windows Internet Communication Settings Path Subversion Arbitrary DLL Injection Code Execution
7405| [67551] Microsoft Windows Indeo Codec (ac25_32.ax) Path Subversion Arbitrary DLL Injection Code Execution
7406| [67548] Microsoft Windows Vista BitLocker Drive Encryption Path Subversion Arbitrary DLL Injection Code Execution
7407| [67546] Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution
7408| [67543] Microsoft Windows Movie Maker Path Subversion Arbitrary OCX Injection Code Execution
7409| [67535] Microsoft Windows Progman Group Converter Path Subversion Arbitrary DLL Injection Code Execution
7410| [67503] Microsoft Outlook Express Path Subversion Arbitrary DLL Injection Code Execution
7411| [67500] Microsoft Windows Live Mail Path Subversion Arbitrary DLL Injection Code Execution
7412| [67484] Microsoft Office Groove Path Subversion Arbitrary DLL Injection Code Execution
7413| [67483] Microsoft Office PowerPoint Path Subversion Arbitrary DLL Injection Code Execution
7414| [67463] Microsoft IE location.replace Address Bar Spoofing
7415| [67408] Microsoft Windows Ipv4SetEchoRequestCreate() Interruption DoS
7416| [67365] Microsoft IE removeAttribute() Method Multiple HTML Element Handling NULL Pointer DoS
7417| [67258] Microsoft ClickOnce MITM Weakness
7418| [67132] Microsoft IE Modal Application Prompt Rendering Unspecified DoS
7419| [67131] Microsoft IE mshtml.dll Malformed CSS Handling DoS
7420| [67119] Microsoft Outlook Web Access (OWA) Multiple Function CSRF
7421| [67083] Microsoft Windows TAPI Server (TAPISRV) Service Isolation Bypass Local Privilege Escalation
7422| [67005] Microsoft Windows TCP/IP Implementation IppSortDestinationAddresses() Function Local Overflow
7423| [67004] Microsoft Windows Malformed IPv6 Extension Header Handling Remote Memory Corruption DoS
7424| [67003] Microsoft IE HTML Layout Table Element Handling Memory Corruption
7425| [67002] Microsoft IE Object Handling Unspecified Memory Corruption (2010-2559)
7426| [67001] Microsoft IE CIframeElement Object Handling Race Condition Memory Corruption
7427| [67000] Microsoft IE boundElements Property Handling Memory Corruption
7428| [66999] Microsoft IE OnPropertyChange_Src() Function Malformed HTML/JS Data Handling Memory Corruption
7429| [66998] Microsoft IE Event Handler Unspecified Cross-domain Information Disclosure
7430| [66997] Microsoft Office Word DOC plcffldMom Parsing Memory Corruption
7431| [66996] Microsoft Office Word RTF Document Object Control Word Drawing Overflow
7432| [66995] Microsoft Office Word RTF Document Control Word Parsing Memory Corruption
7433| [66994] Microsoft Office Word Malformed Record Parsing Unspecified Remote Code Execution
7434| [66993] Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote Code Execution
7435| [66992] Microsoft Silverlight Pointer Handling Unspecified Memory Corruption
7436| [66991] Microsoft Office Excel PivotTable Cache Data Record Handling Overflow
7437| [66990] Microsoft Windows Kernel Object ACL Validation SeObjectCreateSaclAccessBits() Local DoS
7438| [66989] Microsoft Windows Kernel Object Initialization Error Handling Local Privilege Escalation
7439| [66988] Microsoft Windows Kernel Thread Creation Handling NtCreateThread() Local Privilege Escalation
7440| [66987] Microsoft Windows SChannel Malformed Certificate Request Remote Code Execution
7441| [66986] Microsoft Windows Movie Maker Imported Projector File (.MSWMM) String Parsing Overflow
7442| [66985] Microsoft Windows MPEG Layer-3 Audio Stream Decoding Overflow
7443| [66984] Microsoft Windows iccvid.dll VIDC (Cinepak) Codec Decompression Arbitrary Code Execution
7444| [66983] Microsoft Windows win32k.sys Driver xxxCreateWindowsEx hParent Value Handling Local Privilege Escalation
7445| [66982] Microsoft Windows win32k.sys Driver User Mode Input Unspecified Local Privilege Escalation
7446| [66981] Microsoft Windows win32k.sys Driver User Mode Copy Memory Allocation Local Privilege Escalation
7447| [66979] Microsoft Windows win32k.sys Driver GreStretchBltInternal() Handling Local DoS
7448| [66978] Microsoft Windows Tracing Feature for Services Registry String Handling Memory Corruption Local Privilege Escalation
7449| [66977] Microsoft Windows Tracing Feature for Services Registry Key ACL Local Privilege Escalation
7450| [66976] Microsoft Windows SMB Server Compounded Request Handling Stack Exhaustion Remote DoS
7451| [66975] Microsoft Windows SMB Server Crafted Packet Handling Unspecified Remote DoS
7452| [66974] Microsoft Windows SMB Server SMB_COM_TRANSACTION2 Request Handling Remote Code Execution
7453| [66973] Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling Memory Corruption
7454| [66934] Microsoft Windows win32k.sys CreateDIBPalette() Function Local Overflow
7455| [66458] Microsoft DirectX DirectPlay Unspecified NULL Dereference Remote DoS
7456| [66457] Microsoft DirectX DirectPlay Unspecified Packet Handling Remote DoS
7457| [66387] Microsoft Windows Shell LNK File Parsing Arbitrary Command Execution
7458| [66296] Microsoft Outlook SMB Attachment Handling Arbitrary Program Execution
7459| [66295] Microsoft IE / Office FieldList ActiveX (ACCWIZ.dll) Remote Code Execution
7460| [66294] Microsoft Office Access AccWizObjects ActiveX Remote Code Execution
7461| [66219] Microsoft Help Files (.CHM) Locked File Functionality Bypass
7462| [66003] Microsoft Windows win32k.sys NtUserCheckAccessForIntegrityLevel Use-After-Free Local Privilege Escalation
7463| [66001] Microsoft Windows mshtml.dll CTimeoutEventList::InsertIntoTimeoutList Local Pointer Disclosure
7464| [65794] Microsoft IE Cross-domain IFRAME Gadget Focus Change Restriction Weakness Keystroke Disclosure
7465| [65529] Microsoft Windows Help and Support Center sysinfo/sysinfomain.htm svr Parameter XSS
7466| [65503] Microsoft IE CImWebObj ActiveX Local Overflow DoS
7467| [65502] Microsoft IE Unspecified DoS
7468| [65441] Microsoft .NET ASP.NET Form Control __VIEWSTATE Parameter XSS
7469| [65343] Microsoft IE ICMFilter Arbitrary UNC File Access
7470| [65264] Microsoft Windows hcp:// Protocol Handler MPC::HexToNum() Function String Miscalculation Arbitrary Command Execution
7471| [65239] Microsoft Office Excel String Variable Handling Unspecified Code Execution
7472| [65238] Microsoft Office Excel Malformed RTD Handling Memory Corruption
7473| [65237] Microsoft Office Excel Malformed RTD Record Handling Memory Corruption
7474| [65236] Microsoft Office Excel Malformed OBJ Record Handling Overflow
7475| [65235] Microsoft Office Excel Malformed HFPicture Handling Memory Corruption
7476| [65234] Microsoft Office Excel on Mac OS X Open XML Permission Weakness
7477| [65233] Microsoft Office Excel Unspecified Memory Corruption (2010-0823)
7478| [65232] Microsoft Office Excel Malformed ExternName Record Handling Memory Corruption
7479| [65231] Microsoft Office Excel Malformed WOPT Record Handling Memory Corruption
7480| [65230] Microsoft Office Excel EDG / Publisher Record Handling Memory Corruption
7481| [65229] Microsoft Office Excel SxView Record Handling Memory Corruption
7482| [65228] Microsoft Office Excel ADO Object DBQueryExt Record Handling Arbitrary Code Execution
7483| [65227] Microsoft Office Excel SXVIEW Record Parsing Memory Corruption
7484| [65226] Microsoft Office Excel Unspecified Record Handling Stack Corruption Arbitrary Code Execution
7485| [65225] Microsoft Windows Kernel-Mode Driver Window Creation Local Privilege Escalation
7486| [65224] Microsoft Windows Kernel-Mode Driver Win32k.sys GetDCEx() Function Device Contexts (DC) Handling Local Privilege Escalation
7487| [65223] Microsoft Windows Kernel-Mode Driver TrueType Font Parsing Local Privilege Escalation
7488| [65222] Microsoft Windows MJPEG Media Decompression Unspecified Remote Code Execution
7489| [65221] Microsoft Windows Media Decompression Unspecified Remote Code Execution
7490| [65220] Microsoft SharePoint Crafted Request Help Page Invocation Remote DoS
7491| [65219] Microsoft Windows / Office COM Object Instantiation Validation Remote Code Execution
7492| [65218] Microsoft IE 8 Developer Tools ActiveX Remote Code Execution
7493| [65217] Microsoft Windows OpenType Compact Font Format (CFF) Driver Privilege Escalation
7494| [65215] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1259)
7495| [65214] Microsoft IE Uninitialized Object Handling Memory Corruption (2010-1261)
7496| [65213] Microsoft IE HTML Element Handling Memory Corruption
7497| [65212] Microsoft IE CStyleSheet Object Handling Memory Corruption
7498| [65211] Microsoft IE / Sharepoint toStaticHTML Information Disclosure
7499| [65150] Microsoft ASP.NET HtmlContainerControl InnerHtml Property Setting Weakness XSS
7500| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
7501| [65024] Microsoft Access Backslash Escaped Input SQL Injection Protection Bypass
7502| [65013] Microsoft .NET ASP.NET EnableViewStateMac Property Default Configuration XSS
7503| [64980] Microsoft Outlook Web Access (OWA) URI id Parameter Information Disclosure
7504| [64952] Microsoft IE img Tag Hijacking Weakness
7505| [64944] Microsoft Dynamics GP Default System Password
7506| [64928] Microsoft Windows SMB Client Transaction Response Handling Memory Corruption (2010-0476)
7507| [64927] Microsoft Windows SMB Client Transaction SMB_COM_TRANSACTION2 Response Handling Memory Corruption
7508| [64926] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0477)
7509| [64925] Microsoft Windows SMB Client Unspecified Response Handling Memory Corruption (2010-0269)
7510| [64848] Microsoft Dynamics GP System Password Field Substitution Cipher Weakness
7511| [64828] Microsoft IE history go ActiveX Overflow DoS
7512| [64824] Microsoft IE Address Bar Character Conversion Spoofing Weakness
7513| [64794] Microsoft Multiple Products smtpsvc.dll DNS Implementation Predictable Transaction ID MitM DNS Response Spoofing Weakness
7514| [64793] Microsoft Multiple Products smtpsvc.dll DNS Implementation ID Transaction Validation MiTM DNS Response Spoofing Weakness
7515| [64786] Microsoft IE mailto: URL Multiple IFRAME Element Handling DoS
7516| [64731] Microsoft Windows Canonical Display Driver (cdd.dll) Unspecified Memory Corruption
7517| [64666] Microsoft IE Invisible Hand Extension HTTP Request Logging Cookie Product Search Disclosure
7518| [64539] Microsoft Office OCX ActiveX Controls OpenWebFile() Arbitrary Program Execution
7519| [64533] Microsoft IE document.createElement NULL Dereference DoS
7520| [64531] Microsoft Outlook Web Access (OWA) Path Traversal Attachment Handling Weakness
7521| [64530] Microsoft Outlook Express / Windows Mail STAT Response Overflow
7522| [64529] Microsoft Visual Basic for Applications VBE6.dll Single-Byte Stack Overwrite
7523| [64446] Microsoft Office Visio VISIODWG.DLL Crafted DXF File Handling Overflow
7524| [64391] Microsoft Windows Group Policy Management Editor Account Password Removal Weakness
7525| [64341] Microsoft Windows Unspecified SMB Negotiation Remote DoS
7526| [64340] Microsoft Windows RRAS InterfaceAdjustVLSPointers Null Dereference Remote DoS
7527| [64170] Microsoft SharePoint Server _layouts/help.aspx cid0 Parameter XSS
7528| [64083] Microsoft IE XSS Filter Script Tag Filtering Weakness
7529| [64058] Microsoft Windows win32k.sys SfnINSTRING() Local DoS
7530| [64057] Microsoft Windows win32k.sys Driver SfnLOGONNOTIFY() Function Local Privilege Escalation
7531| [63765] Microsoft Windows Media Player ActiveX fourCC Compression Code Codec Retrieval Arbitrary Code Execution
7532| [63749] Microsoft Windows MPEG Layer-3 Audio Decoder AVI File Handling Overflow
7533| [63748] Microsoft Office Publisher 97 File Conversion TextBox Processing Overflow
7534| [63747] Microsoft Windows ISATAP Component IPv6 Tunneled Packet IP Address Spoofing Weakness
7535| [63746] Microsoft Windows Authenticode Signature Verification Cabview Manipulation Privilege Escalation
7536| [63745] Microsoft Windows Authenticode WinVerifyTrust Signature Manipulation Validation Bypass
7537| [63742] Microsoft Office Visio Unspecified Index Calculation Memory Corruption
7538| [63741] Microsoft Office Visio Unspecified Attribute Validation Memory Corruption
7539| [63739] Microsoft Windows SMTP / Exchange Server Malformed Command Sequence Remote Information Disclosure
7540| [63738] Microsoft Windows SMTP / Exchange Server DNS Mail Exchanger (MX) Resource Record Handling Remote DoS
7541| [63736] Microsoft Windows Kernel Symbolic Link Value Processing Unspecified Local DoS
7542| [63735] Microsoft Windows Kernel Exception Handling Unspecified Local DoS
7543| [63733] Microsoft Windows Kernel Registry Link Symbolic Link Extraction Local Privilege Escalation
7544| [63732] Microsoft Windows Kernel Malformed Image Handling Local DoS
7545| [63731] Microsoft Windows Kernel Registry Hive Symbolic Link Creation Local Privilege Escalation
7546| [63730] Microsoft Windows Kernel Registry Key Validation Unspecified Local DoS
7547| [63729] Microsoft Windows Kernel Virtual Path Parsing Local DoS
7548| [63728] Microsoft Windows Unspecified Kernel System Call Registry Handling Local DoS
7549| [63726] Microsoft Windows Media Unicast Service Transport Packet Handling Remote Overflow
7550| [63522] Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Management Implementation Memory Location Protection Mechanism Restriction Bypass
7551| [63473] Microsoft IE XML Document Image Element SRC Attribute Unspecified Issue
7552| [63470] Microsoft IE Unspecified Arbitrary Code Execution (PWN2OWN)
7553| [63469] Microsoft IE DLL File Base Address Discovery Overflow (PWN2OWN)
7554| [63468] Microsoft Windows ANI Parser BITMAPINFO Header Crafted biClrUsed Value DoS
7555| [63428] Microsoft Wireless Keyboard MAC Address XOR Key Generation Weakness
7556| [63335] Microsoft IE Unspecified Uninitialized Memory Corruption
7557| [63334] Microsoft IE Post Encoding Information Disclosure
7558| [63333] Microsoft IE Unspecified Race Condition Memory Corruption
7559| [63332] Microsoft IE Object Handling Unspecified Memory Corruption (2010-0490)
7560| [63331] Microsoft IE HTML Object onreadystatechange Event Handler Memory Corruption
7561| [63330] Microsoft IE HTML Rendering Unspecified Memory Corruption
7562| [63329] Microsoft IE Tabular Data Control (TDC) ActiveX URL Handling CTDCCtl::SecurityCHeckDataURL Function Memory Corruption
7563| [63328] Microsoft IE HTML Element Handling Cross-Domain Information Disclosure
7564| [63327] Microsoft IE CTimeAction Object TIME2 Handling Memory Corruption
7565| [63324] Microsoft IE createElement Method Crafted JavaScript NULL Dereference DoS
7566| [63231] Microsoft Windows Media Player Crafted AVI File Colorspace Conversion Memory Corruption
7567| [62855] Microsoft Windows HTML Help Control ActiveX chm File Handling Arbitrary Code Execution
7568| [62823] Microsoft Office Excel XLS File DbOrParamQry Record Parsing Overflow
7569| [62822] Microsoft Office Excel XLSX File ZIP Header Processing Memory Corruption
7570| [62821] Microsoft Office Excel FNGROUPNAME Record Handling Memory Corruption
7571| [62820] Microsoft Office Excel Workbook Globals Stream MDXSET Record Handling Overflow
7572| [62819] Microsoft Office Excel MDXTUPLE Record Handling Overflow
7573| [62818] Microsoft Office Excel Sheet Object Type Confusion Arbitrary Code Execution
7574| [62817] Microsoft Office Excel File Record Handling Unspecified Memory Corruption
7575| [62811] Microsoft Windows Movie Maker / Producer IsValidWMToolsStream() Function Project File (.MSWMM) Handling Overflow
7576| [62810] Microsoft IE iepeers.dll Use-After-Free Arbitrary Code Execution
7577| [62756] Microsoft Windows VBScript MsgBox() Function helpfile Argument Arbitrary Command Execution
7578| [62660] Microsoft Windows Unspecified API Argument Validation Local DoS
7579| [62652] Microsoft Windows Media Player Crafted MPG File Handling Overflow DoS
7580| [62637] Microsoft Windows Malformed TCP SYN Packet Remote DoS (Blat)
7581| [62632] Microsoft Windows VBScript MsgBox() Function HLP File Arbitrary Command Execution
7582| [62466] Microsoft IE CSS Stylesheet Cross-origin Information Disclosure
7583| [62438] Google Gadget ActiveX Microsoft ATL Template Unspecified Arbitrary Code Execution
7584| [62400] Microsoft Wordpad Malformed RTF File Parsing Memory Exhaustion DoS
7585| [62259] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
7586| [62258] Microsoft Windows Kerberos Ticket-Granting-Ticket Renewal Request NULL Dereference Remote DoS
7587| [62257] Microsoft Windows DirectShow AVI File Decompression Overflow
7588| [62256] Microsoft Windows SMB Server Crafted Network Message Remote Code Execution
7589| [62255] Microsoft Windows SMB Server Crafted Packet Handling Remote DoS
7590| [62254] Microsoft Windows SMB Server Crafted Packet Handling NULL Dereference Remote DoS
7591| [62253] Microsoft Windows SMB Server NTLM Authentication Nonce Entropy Weakness
7592| [62252] Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Session Termination Weakness Local Privilege Escalation
7593| [62251] Microsoft Windows Server 2008 Hyper-V Crafted Instruction Sequence DoS
7594| [62250] Microsoft Windows TCP/IP Stack ICMPv6 Router Advertisement Packet Handling Remote Code Execution
7595| [62249] Microsoft Windows TCP/IP Stack ESP Over UDP Header MDL Fragmentation Remote Code Execution
7596| [62248] Microsoft Windows TCP/IP Stack ICMPv6 Route Information Packet Handling Remote Code Execution
7597| [62247] Microsoft Windows TCP/IP Selective Acknowledgment (SACK) Value Handling Remote DoS
7598| [62246] Microsoft Data Analyzer ActiveX Web Page Handling Unspecified Arbitrary Code Execution
7599| [62245] Microsoft Windows Shell Handler ShellExecute API Crafted URL Arbitrary Command Execution
7600| [62244] Microsoft Windows SMB Client Negotiate Protocol Response Handling Remote Code Execution
7601| [62243] Microsoft Windows SMB Client Packet Handling Race Condition Remote Privilege Escalation
7602| [62242] Microsoft Windows Paint JPEG Image Decoding Overflow
7603| [62241] Microsoft Office Powerpoint TextBytesAtom Record Handling Remote Code Execution
7604| [62240] Microsoft Office Powerpoint TextCharsAtom Record Handling Remote Code Execution
7605| [62239] Microsoft Office Powerpoint File Path Handling Overflow
7606| [62238] Microsoft Office Powerpoint LinkedSlideAtom Handling Remote Code Execution
7607| [62237] Microsoft Office Powerpoint OEPlaceholderAtom placementId Parameter Handling Remote Code Execution
7608| [62236] Microsoft Office Powerpoint msofbtClientData Container OEPlaceholderAtom Use After Free Remote Code Execution
7609| [62235] Microsoft Office Excel MSO.DLL OfficeArtSpgr Container Overflow
7610| [62157] Microsoft IE text/html Content Type URLMON Sniffing Arbitrary File Access
7611| [62156] Microsoft IE Dynamic OBJECT Tag Cross-domain Arbitrary File Access
7612| [61914] Microsoft IE Javascript Cloned DOM Object Handling Memory Corruption
7613| [61913] Microsoft IE HTML Object Handling Unspecified Memory Corruption
7614| [61912] Microsoft IE Baseline Tag Rendering Memory Corruption
7615| [61911] Microsoft IE Table Layout Reuse Memory Corruption
7616| [61910] Microsoft IE Table Layout Col Tag Cache Update Handling Memory Corruption
7617| [61909] Microsoft IE Unspecified Crafted URL Handling Arbitrary Code Execution
7618| [61854] Microsoft Windows Virtual DOS Machine (VDM) Subsystem #GP Trap Handler (nt!KiTrap0D) Local Privilege Escalation
7619| [61697] Microsoft IE mshtml.dll Use-After-Free Arbitrary Code Execution (Aurora)
7620| [61676] Microsoft Windows Live Messenger msnmsgr.exe ActiveX (msgsc.14.0.8089.726.dll) ViewProfile Method MSN Messenger Session Remote DoS
7621| [61651] Microsoft Windows Embedded OpenType Font Engine LZCOMP Decompressor Font Handling Arbitrary Code Execution
7622| [61525] Microsoft Commerce Server ADMINDBPS Registry Key Encoded Password Local Disclosure
7623| [61037] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4312)
7624| [61036] Microsoft Windows Indeo Codec Crafted Media Content Arbitrary Code Execution (2009-4311)
7625| [60858] Microsoft Windows Intel Indeo32 Codec (ir32_32.dll) IV32 FourCC Code Handling Heap Corruption
7626| [60857] Microsoft Windows Indeo Codec Unspecified Memory Corruption
7627| [60856] Microsoft Windows Intel Indeo41 Codec IV41 Stream Video Decompression Overflow
7628| [60855] Microsoft Windows Intel Indeo41 Codec IV41 movi Record Handling Overflow
7629| [60839] Microsoft IE CAttrArray Object Circular Dereference Remote Code Execution
7630| [60838] Microsoft IE CSS Element Access Race Condition Memory Corruption
7631| [60837] Microsoft IE XHTML DOM Manipulation Memory Corruption
7632| [60836] Microsoft Windows Active Directory Federation Services (ADFS) Request Header Handling Remote Code Execution
7633| [60835] Microsoft Windows Active Directory Federation Services (ADFS) Single Sign-on Spoofing
7634| [60834] Microsoft WordPad / Office Text Converters Word97 File Handling Memory Corruption
7635| [60833] Microsoft Windows Internet Authentication Service Crafted MS-CHAP v2 Message Remote Authentication Bypass
7636| [60832] Microsoft Windows Internet Authentication Service Protected Extensible Authentication Protocol (PEAP) Message Handling Remote Memory Corruption
7637| [60831] Microsoft Windows Local Security Authority Subsystem (LSASS) ISAKMP Message Handling Resource Exhaustion Remote DoS
7638| [60830] Microsoft Office Project File Handling Memory Validation Arbitrary Code Execution
7639| [60660] Microsoft IE Response-Changing Mechanism Output Encoding XSS
7640| [60504] Microsoft IE PDF Export Title Property File Path Disclosure
7641| [60490] Microsoft IE Layout STYLE Tag getElementsByTagName Method Handling Memory Corruption
7642| [60401] Microsoft IE Crafted DHTML AnchorClick Attribute Handling Remote DoS
7643| [60397] Microsoft Outlook HTML Email CODEBASE Parameter Arbitrary Program Execution
7644| [60368] Microsoft Windows Terminal Services msgina.dll Unrestricted Resource Lock Remote DoS
7645| [60329] Microsoft Windows 2000 NetBIOS Continuation Packet Remote DoS
7646| [60295] Microsoft IE Image ICC Profile Tag Count Handling DoS
7647| [60294] Microsoft MSN Messenger Image ICC Profile Tag Count Handling DoS
7648| [60282] Microsoft Pocket IE (PIE) object.innerHTML Function Remote DoS
7649| [60225] Microsoft Windows XP System Restore Directory ACL Weakness Local Privilege Escalation
7650| [60210] Microsoft Windows Active Directory Malformed LDAP Client Request Remote DoS
7651| [60206] Microsoft Windows Fast User Switching (FUS) Arbitrary User Process Listing Disclosure
7652| [60198] Microsoft IE DHTML Property setHomePage Method JavaScript Loop Remote DoS
7653| [60150] IISPop Mail Server POP3 Connection Remote Overflow DoS
7654| [60145] Microsoft Windows NT cmd.exe CD Command Arbitrary Local Code Execution
7655| [60057] Microsoft Windows File Protection (WFP) Catalog File (.CAT) Modification Hash Code Comparison Bypass
7656| [60020] Microsoft Visual C++ MFC Static Library ISAPI Extension (Isapi.cpp) CHttpServer::OnParseError Overflow
7657| [60009] Macromedia ColdFusion MX on IIS jrun.dll HTTP Header Handling Remote Overflow DoS
7658| [60008] Macromedia ColdFusion MX on IIS jrun.dll Template File Name Handling Remote Overflow DoS
7659| [60004] Microsoft SQL Server Multiple Stored Procedure Unprivileged Configuration Manipulation
7660| [59996] Apple Mac OS X QuickLook Crafted Microsoft Office Document Handling Overflow
7661| [59968] Microsoft Multiple Products SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
7662| [59957] Microsoft Windows SMB Response Handling Remote DoS
7663| [59886] Microsoft Exchange Malformed Microsoft Remote Procedure Call (MSRPC) Remote DoS
7664| [59869] Microsoft Windows Win32k Table of Directory Entry Building Font Code Parsing Remote Code Execution
7665| [59868] Microsoft Windows Win32k GDI Kernel Component Unspecified Local Privilege Escalation
7666| [59867] Microsoft Windows Win32k Unspecified Kernel System Call Local Privilege Escalation
7667| [59866] Microsoft Office Excel Document Record Parsing Memory Corruption
7668| [59865] Microsoft Windows Web Services on Devices API (WSDAPI) Message Header Handling Memory Corruption
7669| [59864] Microsoft Office Excel Malformed Record Object Sanitization Failure Arbitrary Code Execution
7670| [59863] Microsoft Office Excel Formula Handling Pointer Corruption Arbitrary Code Execution
7671| [59862] Microsoft Office Excel Cell Embeded Formula Parsing Memory Corruption
7672| [59861] Microsoft Office Excel BIFF Record Parsing Overflow
7673| [59860] Microsoft Office Excel BIFF File FEATHEADER cbHdrData Size Element Handling Memory Corruption
7674| [59859] Microsoft Office Excel SxView Record Handling Memory Corruption
7675| [59858] Microsoft Office Excel Malformed PivotCache Stream Handling Memory Corruption
7676| [59857] Microsoft Office Word Document Malformed File Information Block (FIB) Parsing Memory Corruption
7677| [59856] Microsoft Windows Active Directory Malformed LDAP Request Stack Exhaustion Remote DoS
7678| [59855] Microsoft Windows License Logging Server (llssrv.exe) RPC LlsrLicenseRequestW Method Remote Overflow
7679| [59819] Microsoft Windows RPC Session Handle Hijacking Remote Privilege Escalation
7680| [59808] Microsoft Exchange Request Saturation License Exhaustion Remote DoS
7681| [59774] Multiple Antivirus Microsoft Exchange Malformed E-mail X Header Scan Bypass
7682| [59738] Microsoft Windows ZIP Filename Handling Overflow DoS
7683| [59736] Microsoft Windows Media Player (WMP) on Solaris Installation Permission Weakness Local Privilege Escalation
7684| [59734] Microsoft Windows Log Clearning Function Admin Notification Weakness
7685| [59733] Microsoft Windows 2000 Terminal Services Screensaver Screen Minimization Locking Weakness
7686| [59732] Microsoft Windows Screensaver Domain Account Lock Verification Local Brute Force Weakness
7687| [59731] Microsoft Windows 2000 DCOM Client Alter Context Request Remote Information Disclosure
7688| [59730] Microsoft Windows 2000 Terminal Services Disconnect Feature Local Privilege Escalation
7689| [59653] Microsoft MN-500 Backup Function Cleartext Credential Local Disclosure
7690| [59636] Microsoft SQL Server SQL Authentication Password Encryption Weakness
7691| [59563] Microsoft Baseline Security Analyzer (MBSA) Security Scan Result Cleartext Local Disclosure
7692| [59515] Microsoft Windows csrss.exe Command Prompt Input Manipulation Forced Reboot DoS
7693| [59514] Microsoft Windows 2000 Task Manager Uppercase Process Name Termination Weakness
7694| [59513] Microsoft Windows NT winnt/system32 Write Access Local DoS (NT4ALL)
7695| [59509] Microsoft Windows 2000 Encrypted File System Cleartext Backup File Local Disclosure
7696| [59503] Microsoft IE Rendering Engine Crafted MIME Type Arbitrary Script Execution
7697| [59502] Microsoft IE / Outlook Express Crafted XML Stylesheet (XSL) Arbitrary Script Execution
7698| [59501] Microsoft IE MSScriptControl.ScriptControl / GetObject Frame Domain Validation Bypass
7699| [59500] Microsoft IE HTML Parser (MSHTML.DLL) Browser Window Object Handling DoS
7700| [59479] Microsoft Office SharePoint Server Team Services _layouts/download.aspx Multiple Parameter ASP.NET Source Disclosure
7701| [59347] Microsoft Windows SYSKEY Registry EFS Startup Key Disclosure
7702| [59346] Microsoft Windows 2000 Crafted TCP/UDP Traffic CPU Consumption Remote DoS
7703| [59340] Microsoft Windows NT Logon Box Account Name Disclosure
7704| [59333] Microsoft Windows NT Winlogon Key Local Shutdown DoS
7705| [59325] Microsoft Windows NT Scheduler Drive Mapping Permission Weakness Local Privilege Escalation
7706| [59323] Microsoft IE Active Movie ActiveX Arbitrary File Download
7707| [59322] Microsoft Jet Database Crafted Query Arbitrary Command Execution
7708| [59289] Microsoft Java Virtual Machine getSystemResourceAsStream Function Arbitrary File Access
7709| [59264] Microsoft Windows Crafted Fragmented Packet Stream Remote DoS (Jolt)
7710| [59263] Microsoft IE IMG Tag width Handling DoS
7711| [59260] Microsoft Windows NT SNMP Agent Query Saturation Remote DoS
7712| [59259] Microsoft Site Server / Commercial Internet System (MCIS) Cookie Expiry Weakness
7713| [59258] Microsoft Exchange ACL Modification Update Weakness
7714| [59250] Microsoft Windows NT Fragmented Packet Handling Remote DoS (ntfrag)
7715| [59241] Microsoft Windows CreateRemoteThread Function Arbitrary Writeable Process Termination DoS
7716| [58876] Microsoft Windows SMB Packet Command Value Handling Remote Code Execution
7717| [58875] Microsoft Windows SMBv2 Packet Handling Infinitie Loop Remote DoS
7718| [58874] Microsoft IE CSS Parsing writing-mode Style Memory Corruption
7719| [58873] Microsoft IE DOM Copy Constructor Event Object Initialization Memory Corruption
7720| [58872] Microsoft IE HTML Component Handling Arbitrary Code Execution
7721| [58871] Microsoft IE Data Stream Header Corruption Arbitrary Code Execution
7722| [58870] Microsoft Office BMP Image Color Processing Overflow
7723| [58869] Microsoft Office Malformed Object Handling Memory Corruption Arbitrary Code Execution
7724| [58868] Microsoft Multiple Products GDI+ PNG Image Handling Integer Overflow
7725| [58867] Microsoft Multiple Products GDI+ .NET API Code Execution Privilege Escalation
7726| [58866] Microsoft Multiple Products GDI+ TIFF Image Handling Memory Corruption Arbitrary Code Execution
7727| [58865] Microsoft Multiple Products GDI+ TIFF Image Handling Overflow
7728| [58864] Microsoft Multiple Products GDI+ PNG Image Handling Heap Overflow
7729| [58863] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
7730| [58862] Microsoft Windows LSASS Malformed NTLM Authentication Packets Remote Overflow DoS
7731| [58861] Microsoft Windows Kernel Exception Handler Unspecified Local DoS
7732| [58860] Microsoft Windows Kernel User Mode PE File Handling NULL Dereference Local Privilege Escalation
7733| [58859] Microsoft Windows Kernel 64-bit Value Conversion Truncation Local Privilege Escalation
7734| [58856] Microsoft Windows CryptoAPI X.509 Certificate Object Identifier Handling Overflow Spoofing Weakness
7735| [58855] Microsoft Windows CryptoAPI X.509 Certificate Common Name Null Truncation Spoofing
7736| [58854] Microsoft Windows Indexing Service ActiveX Memory Corruption Arbitrary Code Execution
7737| [58851] Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulation Arbitrary Code Execution
7738| [58850] Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution
7739| [58849] Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary Code Execution
7740| [58845] Microsoft Windows Media Runtime Compressed Audio File Handling Heap Corruption Arbitrary Code Execution
7741| [58844] Microsoft Windows Media Player ASF Runtime Voice Sample Rate Handling Arbitrary Code Execution
7742| [58843] Microsoft Windows Media Player ASF Handling Overflow
7743| [58817] Microsoft IE Nested marquee Tag Handling DoS
7744| [58788] Microsoft IE Crafted File Extension Download Security Warning Bypass
7745| [58786] Microsoft Windows User Profile Unloading Session Persistence Weakness
7746| [58785] Microsoft Windows MFC Component (MFC42u.dll) AfxOleSetEditMenu Function RTF Malformed OLE Object Handling Overflow
7747| [58480] Microsoft IE X.509 Certificate Authority (CA) Common Name Null Byte Handling SSL MiTM Weakness
7748| [58399] Microsoft IE window.print Function Loop Remote DoS
7749| [58397] Microsoft IE Auto Form Submission KEYGEN Element Remote DoS
7750| [58350] Microsoft Patterns &
7751| [57806] Microsoft Windows Wireless LAN AutoConfig Service (wlansvc) Frame Parsing Arbitrary Code Execution
7752| [57804] Microsoft JScript Scripting Engine Memory Corruption Arbitrary Code Execution
7753| [57803] Microsoft Windows Media MP3 File Handling Memory Corruption
7754| [57802] Microsoft Windows Media ASF Header Parsing Invalid Free Arbitrary Code Execution
7755| [57799] Microsoft Windows srv2.sys Kernel Driver SMB2 Malformed NEGOTIATE PROTOCOL REQUEST Remote DoS
7756| [57798] Microsoft Windows DHTML Editing Component ActiveX Arbitrary Code Execution
7757| [57797] Microsoft Windows TCP/IP Orphaned Connection Handling Remote DoS
7758| [57796] Microsoft Windows TCP/IP Packet State Information Handling Remote Code Execution
7759| [57795] Microsoft Windows TCP/IP Implementation Queue Connection Saturation TCP State Table Remote DoS
7760| [57742] Microsoft SQL Cleartext User Passwords Disclosure
7761| [57654] Microsoft IE JavaScript LI Element Creation Value Attribute Handling Remote DoS
7762| [57638] Microsoft Outlook Express IMAP Client literal_size Remote Overflow
7763| [57515] Microsoft IE window.open() New Window URL Path Spoofing Weakness
7764| [57506] Microsoft IE location.hash Javascript Handling Remote DoS
7765| [57500] Sophos PureMessage for Microsoft Exchange Scan Engine Load Handling Scan Protection Bypass
7766| [57499] Sophos PureMessage for Microsoft Exchange EdgeTransport.exe TNEF-Encoded Message Cleartext Conversion DoS
7767| [57493] Sophos PureMessage Scanner (PMScanner.exe) for Microsoft Exchange Crafted File Handling DoS
7768| [57142] Microsoft IE Malformed DIV / SCRIPT Element Handling DoS
7769| [57118] Microsoft IE onblur() / onfocusout() Functions Nested Loop DoS
7770| [57113] Microsoft IE Extended HTML Form Non-HTTP Protocol XSS
7771| [57064] Microsoft IE Crafted UTF-7 Context XSS Filter Bypass
7772| [57063] Microsoft IE Multiple CRLF Injected HTTP Header XSS Filter Bypass
7773| [57062] Microsoft IE STYLE Element / CSS Expression Property Double Content Injection XSS Filter Bypass
7774| [57016] Microsoft Windows win32k.sys Embedded OpenType Font Handling DoS
7775| [56916] Microsoft Office Web Components HTMLURL Parameter ActiveX Spreadsheet Object Handling Overflow
7776| [56915] Microsoft Office Web Components OWC10.Spreadsheet ActiveX BorderAround() Method Heap Corruption Arbitrary Code Execution
7777| [56914] Microsoft Office Web Components OWC10 ActiveX Loading/Unloading Memory Allocation Arbitrary Code Execution
7778| [56912] Microsoft Windows Terminal Services Client ActiveX Unspecified Overflow
7779| [56911] Microsoft Remote Desktop Server (RDS) mstscax.dll Packet Parsing Remote Overflow
7780| [56910] Microsoft Visual Studio Active Template Library (ATL) Header Mismatch Remote Code Execution
7781| [56909] Microsoft Windows AVI Media File Parsing Unspecified Overflow
7782| [56908] Microsoft Windows Malformed AVI Header Parsing Arbitrary Code Execution
7783| [56905] Microsoft .NET Framework Request Scheduling Crafted HTTP Request Remote DoS
7784| [56904] Microsoft Windows Telnet NTLM Credential Reflection Remote Access
7785| [56902] Microsoft Windows Workstation Service NetrGetJoinInformation Function Local Memory Corruption Arbitrary Code Execution
7786| [56901] Microsoft Windows Message Queuing Service (MSMQ) mqac.sys IOCTL Request Parsing Local Privilege Escalation
7787| [56900] Microsoft Windows Internet Name Service (WINS) Network Packet Handling Remote Integer Overflow
7788| [56899] Microsoft Windows Internet Name Service (WINS) Push Request Handling Remote Overflow
7789| [56852] Microsoft IE XML Document start-tags Handling CPU Consumption DoS
7790| [56780] Microsoft Windows win32k.sys NtUserConsoleControl Function Memory Manipulation Local Privilege Escalation
7791| [56779] Microsoft IE mshtml.dll JavaScript findText Method Unicode String Handling DoS
7792| [56699] Microsoft Visual Studio Active Template Library (ATL) String Manipulation Arbitrary Memory Disclosure
7793| [56698] Microsoft Visual Studio Active Template Library (ATL) Data Stream Object Instantiation Remote Code Execution
7794| [56696] Microsoft Visual Studio Active Template Library (ATL) Headers VariantClear Corrupt Stream Handling Remote Code Execution
7795| [56695] Microsoft IE HTML Embedded CSS Property Modification Memory Corruption
7796| [56694] Microsoft IE Invalid HTML Object Element Appendage Handling Memory Corruption
7797| [56693] Microsoft IE timeChildren Object ondatasetcomplete Event Method Memory Corruption
7798| [56525] Microsoft Eyedog ActiveX Unspecified Overflow
7799| [56516] Microsoft Windows lpCmdLine Filename Whitespace Handling Weakness
7800| [56514] Microsoft Windows gzip Libraries Unspecified Remote Code Execution
7801| [56513] Microsoft Windows Autorun / NoDriveTypeAutoRun Registry Value Enforcement Weakness
7802| [56489] Microsoft IE Proxy Server CONNECT Response Cached Certificate Use MiTM HTTPS Site Spoofing
7803| [56485] Microsoft IE iFrame HTTP / HTTPS Content Detection Weakness
7804| [56480] Microsoft IE HTTP Response Refresh Header javascript: URI XSS
7805| [56438] Microsoft XML Core Services Set-Cookie HTTP Response Header Restriction Weakness
7806| [56432] Microsoft IE onclick Action Mouse Click Subversion (Clickjacking)
7807| [56323] Microsoft IE Write Method Unicode String Argument Handling Remote DoS
7808| [56272] Microsoft Video ActiveX (msvidctl.dll) Unspecified Remote Arbitrary Code Execution
7809| [56254] Microsoft IE Select Object Length Property Handling Memory Consumption DoS
7810| [55855] Microsoft IE AddFavorite Method URL Handling Remote DoS
7811| [55845] Microsoft DirectX DirectShow quartz.dll QuickTime NumberOfEntries Field Memory Corruption
7812| [55844] Microsoft DirectX DirectShow QuickTime File Pointer Validation Arbitrary Code Execution
7813| [55843] Microsoft Windows Embedded OpenType (EOT) Font Name Tables Parsing Overflow
7814| [55842] Microsoft Windows Embedded OpenType (EOT) Font Data Record Parsing Overflow
7815| [55838] Microsoft Office Publisher PUBCONV.DLL Legacy Format Importation Pointer Dereference Arbitrary Code Execution
7816| [55837] Microsoft Virtual PC / Virtual Server Instruction Decoding Unspecified Local Privilege Escalation
7817| [55836] Microsoft ISA Server 2006 Radius OTP Security Bypass
7818| [55806] Microsoft Office Web Components OWC10.Spreadsheet ActiveX msDataSourceObject() Method Memory Corruption
7819| [55651] Microsoft DirectShow Video Streaming ActiveX (msvidctl.dll) IMPEG2TuneRequest DirectX Object Interface Overflow
7820| [55645] Microsoft Windows Live Messenger (WLM) msnmsgr.exe Malformed Content-Type Header Remote DoS
7821| [55644] Microsoft Windows Live Messenger Client MSN Protocol over NAT Multiple Header Field Internal IP Disclosure
7822| [55345] Microsoft libc src/lib/libc/gen/fts.c fts_build() Function fts Nested Directory Handling Local DoS
7823| [55332] Microsoft Windows PPTP Server (Raspptpe.sys) Malformed Control Packet Remote DoS
7824| [55309] Microsoft Windows ICMP Type 9 Packet Remote DoS
7825| [55129] Microsoft IE HTTP Host Header Proxy Server CONNECT Response Document Context SSL Tampering Weakness
7826| [55050] Microsoft Windows win32k.sys Thread Handling Local Race Condition DoS
7827| [54961] Microsoft Office PowerPoint Freelance Windows Translator (FL21WIN.DLL) Layout Parsing Overflow
7828| [54960] Microsoft Office Word Malformed Record Handling Overflow (2009-0565)
7829| [54959] Microsoft Office Word Malformed Length Field Handling Overflow (2009-0563)
7830| [54958] Microsoft Office Excel BIFF File QSIR Record Object Pointer Handling Remote Code Execution
7831| [54957] Microsoft Office Excel File SST Record Handling String Parsing Overflow
7832| [54956] Microsoft Office Excel Record Object Field Sanitization Memory Corruption
7833| [54955] Microsoft Office Excel Malformed Records Handling Overflow
7834| [54954] Microsoft Office Excel Record Parsing Array Indexing Memory Corruption
7835| [54953] Microsoft Office Excel Malformed Object Record Corruption Remote Code Execution
7836| [54952] Microsoft Office Excel Malformed Record Object Pointer Handling Remote Code Execution (2009-0549)
7837| [54951] Microsoft IE Crafted HTML Malformed Row Property References Memory Corruption
7838| [54950] Microsoft IE Crafted onreadystatechange Event Memory Corruption
7839| [54949] Microsoft IE Crafted HTML Document Node Addition Event Handler Memory Corruption
7840| [54948] Microsoft IE setCapture Function Object Handling Uninitialized Memory Corruption
7841| [54947] Microsoft IE Crafted AJAX XMLHttpRequest Synchronization Memory Corruption
7842| [54946] Microsoft IE DHTML tr Element Handling Crafted Method Memory Corruption
7843| [54945] Microsoft IE Cached Data Handling Cross-Domain Information Disclosure
7844| [54944] Microsoft IE Race Condition Cross-Domain Information Disclosure
7845| [54943] Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escalation
7846| [54942] Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation
7847| [54941] Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation
7848| [54940] Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation
7849| [54939] Microsoft Office Works for Windows File Converter .wps Handling Overflow
7850| [54938] Microsoft Windows Active Directory Crafted LDAP(S) Request Handling Remote DoS
7851| [54937] Microsoft Windows Active Directory Crafted LDAP(S) Request Hexdecimal DN AttributeValue Handling Arbitrary Code Execution
7852| [54936] Microsoft Windows RPC Marshalling Engine Internal State Manipulation Remote Code Execution
7853| [54935] Microsoft Windows MSHTML Search Preview Display Information Disclosure
7854| [54934] Microsoft Windows Print Spooler Load Library Crafted RPC Message Arbitrary DLL Loading Privilege Escalation
7855| [54933] Microsoft Windows Print Spooler Crafted Separator Page Arbitrary Local File Disclosure
7856| [54932] Microsoft Windows Print Spooler win32spl.dll EnumeratePrintShares Function Remote Overflow
7857| [54931] Microsoft Windows SystemParametersInfo() Function SPI_*DESKWALLPAPER Call Local DoS
7858| [54797] Microsoft DirectX DirectShow quartz.dll QuickTime NULL Byte Overwrite Arbitrary Code Execution
7859| [54700] Microsoft GDI+ gdiplus.dll GpFont:etData Function Crafted EMF File Handling Off-by-one Overflow
7860| [54444] Apple Mac OS X Microsoft Office Spotlight Importer File Handling Memory Corruption
7861| [54394] Microsoft Office PowerPoint Multiple Record Types Handling Overflow
7862| [54393] Microsoft Office PowerPoint CurrentUserAtom Atom Parsing Multiple Overflows
7863| [54392] Microsoft Office PowerPoint Unspecified Crafted File Handling Heap Corruption
7864| [54391] Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Arbitrary Code Execution
7865| [54390] Microsoft Office PowerPoint BuildList Record Parsing Memory Corruption Arbitrary Code Execution
7866| [54389] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-1128)
7867| [54388] Microsoft Office PowerPoint PP7 Crafted File Handling Memory Corruption Arbitrary Code Execution (2009-0225)
7868| [54387] Microsoft Office PowerPoint PPT95 Import (PP7X32.DLL) File Handling Multiple Overflows
7869| [54386] Microsoft Office PowerPoint PPT Importer (PP4X32.DLL) Legacy File Format Handling Multiple Overflows
7870| [54385] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) String Parsing Memory Corruption Arbitrary Code Execution
7871| [54384] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0227)
7872| [54383] Microsoft Office PowerPoint Conversion Filter (PP4X32.DLL) Structure Parsing Memory Corruption Arbitrary Code Execution (2009-0223)
7873| [54382] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-0222)
7874| [54381] Microsoft Office PowerPoint Legacy File Format Handling Unspecified Remote Code Execution (2009-1137)
7875| [54292] Microsoft ActiveSync RNDIS over USB System Lock Bypass
7876| [54191] Microsoft Windows GDI+ PNG File Handling Infinite Loop DoS
7877| [54183] Microsoft IE Unprintable Character Document Handling DoS
7878| [53933] Microsoft Whale Client Components ActiveX (WhlMgr.dll) Multiple Method Overflow
7879| [53804] Microsoft Windows Media Player MID File Handling Overflow DoS
7880| [53750] Oracle Outside In Technology Microsoft Office File Optional Data Stream Parsing Overflow
7881| [53749] Oracle Outside In Technology Microsoft Office Spreadsheet Record Handling Overflow (2009-1010)
7882| [53748] Oracle Outside In Technology Microsoft Excel Spreadsheet Record Handling Remote Overflow (2009-1009)
7883| [53668] Microsoft Windows ThreadPool ACL Enforcement Weakness Local Privilege Escalation
7884| [53667] Microsoft Windows RPCSS Service Isolation Local Privilege Escalation
7885| [53666] Microsoft Windows Management Instrumentation (WMI) Service Isolation Local Privilege Escalation
7886| [53665] Microsoft Office Excel Malformed Object Handling Memory Corruption
7887| [53664] Microsoft WordPad Word 97 Text Converter File Handling Overflow
7888| [53663] Microsoft Office Word 2000 WordPerfect 6.x Converter Document Handling Stack Corruption
7889| [53662] Microsoft WordPad / Office Text Converter Malformed Data Handling Memory Corruption
7890| [53637] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Forms Authentication Component Unspecified XSS
7891| [53636] Microsoft ISA Server / Forefront Threat Management Gateway (TMG) Web Proxy TCP State Handling DoS
7892| [53632] Microsoft DirectShow MJPEG Decompression Unspecified Arbitrary Code Execution
7893| [53627] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0554)
7894| [53626] Microsoft IE EMBED Element Handling Memory Corruption Arbitrary Code Execution
7895| [53625] Microsoft IE Unitialized Object Memory Corruption Arbitrary Code Execution (2009-0552)
7896| [53624] Microsoft IE Page Transition Unspecified Memory Corruption Arbitrary Code Execution
7897| [53623] Microsoft Windows SearchPath File Open / Locating Unspecified Arbitrary Code Execution
7898| [53621] Microsoft Windows HTTP Services Digital Certificate Distinguished Name Mismatch Weakness
7899| [53620] Microsoft Windows HTTP Services Web Server Response Unspecified Integer Underflow
7900| [53619] Microsoft Windows HTTP Services NTLM Credential Replay Privileged Code Execution
7901| [53533] Microsoft Windows Task Manager (taskmgr.exe) I/O Activity Local Information Disclosure
7902| [53340] Microsoft IE JavaScript Implementation Web Site Temporary Footprint Spoofing Weakness
7903| [53306] Microsoft Money prtstb06.dll ActiveX Startup Property Remote DoS
7904| [53248] Microsoft Windows DNS Server Crafted Packets Remote Memory Consumption DoS
7905| [53182] Microsoft Office PowerPoint PPT File Handling Unspecified Code Execution
7906| [52892] Microsoft IE on Windows Link Click Unspecified Arbitrary Code Execution (PWN2OWN)
7907| [52695] Microsoft Office Excel Crafted Document Invalid Object Reference Unspecified Code Execution
7908| [52694] Microsoft Windows Media Player Malformed GET Request DoS
7909| [52693] Microsoft Windows Mobile Bluetooth Stack OBEX FTP Service Traversal Arbitrary File Manipulation
7910| [52692] Microsoft SMB NT Trans2 Request Parsing Unspecified Remote Code Execution
7911| [52691] Microsoft SMB NT Trans Request Parsing Overflow Remote Code Execution
7912| [52690] Microsoft Office Word Malformed Table Property Handling Memory Corruption
7913| [52689] Microsoft Word Document Handling HTML Object Tag DoS
7914| [52688] Microsoft Word Document Handling HTML Object Tag XSS
7915| [52686] Microsoft Office Hyperlink Target Digital Signatures Weakness
7916| [52685] Microsoft Windows FTP Client Multiple Command Overflows
7917| [52684] Microsoft Forms Multiple ActiveX (FM20.dll) Memory Access Violations
7918| [52683] Microsoft Windows explorer.exe Malformed PNG Handling DoS
7919| [52682] Microsoft Windows Explorer ZIP Handler DoS
7920| [52681] Microsoft Windows Firewall sessmgr.exe Port Restriction Local Bypass
7921| [52671] Microsoft IE shell32 Module Unspecified Form Data Handling Overflow
7922| [52670] Microsoft IE Double Injection Bypass Anti-XSS Filter Bypass
7923| [52669] Microsoft IE UTF-7 Character Set Bypass Anti-XSS Filter Bypass
7924| [52668] Microsoft IE CRLF Injection Multiple Method Bypass Anti-XSS Filter Bypass
7925| [52667] Microsoft IE navcancl.htm Local Resource Refresh Link XSS
7926| [52666] Microsoft IE Malformed file:// URI Handling DoS
7927| [52665] Microsoft IE IObjectSafety Functionality Object Creation Call DoS
7928| [52664] Microsoft IE Relative Path Handling Spoofing Weakness
7929| [52663] Microsoft IE Crafted Pop-up Directional Address Bar Spoofing
7930| [52660] Microsoft IE about:blank Blank Tab Spoofing Weakness
7931| [52524] Microsoft Windows Invalid Pointer Local Privilege Escalation
7932| [52523] Microsoft Windows Handle Validation Local Privilege Escalation
7933| [52522] Microsoft Windows GDI Kernel Component Unspecified Remote Code Execution
7934| [52521] Microsoft Windows SChannel Certificate Based Authentication Spoofing Bypass
7935| [52520] Microsoft Windows WPAD WINS Server Registration Web Proxy MiTM Weakness
7936| [52519] Microsoft Windows DNS Server WPAD Registration Dynamic Update MiTM Weakness
7937| [52518] Microsoft Windows DNS Server Response Response Validation Transaction ID Prediction Weakness
7938| [52517] Microsoft Windows DNS Server Query Validation Spoofing
7939| [51840] Microsoft IE XHTML Strict Mode CSS Handling Memory Corruption Arbitrary Code Execution
7940| [51839] Microsoft IE Document Object Handling Memory Corruption Arbitrary Code Execution
7941| [51838] Microsoft Exchange Server EMSMDB2 Invalid MAPI Command Remote DoS
7942| [51837] Microsoft Exchange Server Message Transport Neutral Encapsulation Format (TNEF) Decoding Remote Code Execution
7943| [51836] Microsoft Office Visio File Opening Memory Functions Arbitrary Code Execution
7944| [51835] Microsoft Office Visio Object Data Memory Functions Arbitrary Code Execution
7945| [51834] Microsoft Office Visio File Opening Object Data Handling Arbitrary Code Execution
7946| [51503] Microsoft Word Save as PDF Add-on Emailed PDF Path Disclosure
7947| [51433] Microsoft Windows Crafted CHM File Handling Overflow
7948| [51320] Microsoft IE chromehtml: URI --renderer-path Option Arbitrary Command Execution
7949| [51277] Microsoft Excel HTML Tag Interpretation XSS
7950| [51259] Microsoft IE onload=screen["
7951| [51133] Microsoft Windows Media Player Multiple File Handling Remote Overflow
7952| [50974] Microsoft Outlook Express InetComm.dll MimeOleClearDirtyTree Function Malformed Email Header Handling Infinite Loop DoS
7953| [50959] Microsoft Word / Publisher Malformed wordart Handling DoS
7954| [50778] Microsoft Remote Help SAFRCFileDlg.RASetting ActiveX (safrcdlg.dll) GetProfileString Function Overflow
7955| [50745] Microsoft Office Web Controls OWC11.DataSourceControl Memory Access Violation
7956| [50622] Microsoft IE mshtml.dll XSML Nested SPAN Element Handling Unspecified Arbitrary Code Execution
7957| [50615] Microsoft ASP.NET Malformed File Request Path Disclosure
7958| [50613] Microsoft IE WebDAV Cached Content Request Parsing Overflow
7959| [50612] Microsoft IE Object Handling Uninitialized Memory Corruption
7960| [50611] Microsoft IE Navigation Methods Parameter Validation Memory Corruption
7961| [50610] Microsoft IE EMBED Tag File Name Extension Overflow
7962| [50598] Microsoft Office Word Table Property Handling Overflow
7963| [50597] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4031)
7964| [50596] Microsoft Office Word RTF Object Parsing Arbitrary Code Execution (2008-4030)
7965| [50595] Microsoft Office Word RTF Drawing Object Parsing Overflow
7966| [50593] Microsoft Office Word RTF Consecutive Drawing Object Parsing Memory Corruption
7967| [50592] Microsoft Office Word Malformed Value Memory Corruption
7968| [50591] Microsoft Office Word RTF Polyline/Polygon Object Parsing Overflow
7969| [50590] Microsoft Office Word Malformed File Information Block (FIB) lcbPlcfBkfSdt' Field Memory Corruption
7970| [50589] Microsoft SQL Server 2000 sp_replwritetovarbin() Stored Procedure Overflow
7971| [50585] Microsoft Office SharePoint Server Administrative URL Security Bypass
7972| [50581] Microsoft Visual Basic Charts Control ActiveX (Mschrt20.ocx) Unspecified Memory Corruption
7973| [50580] Microsoft Visual Basic Animation ActiveX (mscomct2.ocx) AVI Parsing Memory Corruption
7974| [50579] Microsoft Visual Basic Hierarchical FlexGrid ActiveX (mshflxgd.ocx) Multiple Method Memory Corruption
7975| [50578] Microsoft Visual Basic FlexGrid ActiveX (msflxgrd.ocx) Unspecified Memory Corruption
7976| [50577] Microsoft Visual Basic DataGrid ActiveX (msdatgrd.ocx) Unspecified Memory Corruption
7977| [50567] Microsoft Windows WordPad Text Converter Unspecified Memory Corruption
7978| [50566] Microsoft Windows Explorer search-ms Protocol Handler Arbitrary Code Execution
7979| [50565] Microsoft Windows Explorer Saved Search File Handling Arbitrary Code Execution
7980| [50562] Microsoft Windows GDI WMF Image Size Parameter Parsing Overflow
7981| [50561] Microsoft Windows GDI WMF Image Parsing Integer Math Overflow
7982| [50559] Microsoft Windows Media Component Crafted ISATAP Address NTLM Credential Disclosure
7983| [50558] Microsoft Windows Media Component Service Principal Name (SPN) Credential Reflection Arbitrary Code Execution
7984| [50557] Microsoft Excel NAME Record Global Array Parsing Memory Corruption
7985| [50556] Microsoft Excel Malformed Object Record Parsing Memory Corruption
7986| [50555] Microsoft Excel Malformed Formula Parsing Memory Corruption
7987| [50533] Microsoft Windows Media Services nskey.dll ActiveX CallHTMLHelp Method Overflow
7988| [50488] Microsoft Multiple Products Crafted RTCP Receiver Report Packet Handling Remote DoS
7989| [50330] Microsoft Communicator Instant Message Emoticon Saturation Remote DoS
7990| [50320] Microsoft Communicator SIP INVITE Request Handling Session Saturation DoS
7991| [50302] Microsoft .NET Framework Strong Name Implementation DLL File Public Key Token Subversion Multiple Mechanism Authentication Bypass
7992| [50287] Microsoft Windows Vista iphlpapi.dll CreateIpForwardEntry2() Function Memory Corruption
7993| [50280] Microsoft Windows UnhookWindowsHookEx Call Saturation Race Condition Local DoS
7994| [50279] Microsoft XML Core Services HTTP Request Header Field Cross-domain Session State Manipulation
7995| [50252] Microsoft Windows Media Player Crafted DAT File MThd Header Handling DoS
7996| [50251] Microsoft Windows Media Player Crafted MIDI File MThd Header Handling DoS
7997| [50138] Microsoft SharePoint Host Name / Port Number Persistence HTML Document Same-origin Relationship Bypass XSS
7998| [50074] Cisco Unity Unspecified Microsoft API Dynamic UDP Port Packet Handling Remote DoS
7999| [50044] Microsoft IE Non-Blocking Space Character Visual Truncation Address Bar Spoofing
8000| [50043] Microsoft IE High-bit URL Encoded Character Address Bar Spoofing
8001| [50000] Microsoft Windows Active Directory LDAP Server Bind Request User Account Enumeration
8002| [49926] Microsoft XML Core Services DTD Crafted XML Document Handling Cross-Domain Scripting Remote Information Disclosure
8003| [49897] Microsoft Windows Explorer Crafted ZIP File Handling DoS
8004| [49895] Microsoft Windows GDI+ gdiplus.dll Crafted ICO File Handling DoS
8005| [49736] Microsoft Windows SMB NTLM Authentication Credential Replay Remote Code Execution
8006| [49729] Microsoft Internet Authentication Service (IAS) Helper COM Component ActiveX (iashlpr.dll) PutProperty Method Remote DoS
8007| [49728] Microsoft IE Crafted URL-encoded String alert Function DoS
8008| [49592] Microsoft Office DjVu ActiveX (DjVu_ActiveX_MSOffice.dll) Multiple Property Overflow
8009| [49590] Microsoft Debug Diagnostic Tool DebugDiag ActiveX (CrashHangExt.dll) GetEntryPointForThread Method DoS
8010| [49586] Microsoft IE Mshtml.dll CDwnTaskExec::ThreadExec Function PNG File Handling DoS
8011| [49442] IBM Tivoli Storage Manager (TSM) Express for Microsoft SQL SQL CAD Data Protection (dsmcat.exe) Remote Overflow
8012| [49385] Microsoft ASP.NET Request Validation <
8013| [49384] Microsoft ASP.NET Request Validation <
8014| [49364] Cisco PIX / ASA Microsoft Windows NT VPN Domain Authentication Bypass
8015| [49243] Microsoft Windows Server Service Crafted RPC Request Handling Unspecified Remote Code Execution
8016| [49230] Microsoft Outlook Web Access (OWA) exchweb/bin/redir.asp URL Variable Arbitrary Site Redirect
8017| [49118] Microsoft IE HTML Object Handling Memory Corruption
8018| [49117] Microsoft IE componentFromPoint Unitialized Memory Corruption
8019| [49116] Microsoft IE Unspecified Cross-domain Information Disclosure
8020| [49115] Microsoft IE Unspecified Cross-domain Arbitrary Script Execution
8021| [49114] Microsoft IE Unspecified HTML Element Cross-Domain Code Execution
8022| [49113] Microsoft IE Window Location Property Cross-Domain Code Execution
8023| [49082] Microsoft PicturePusher ActiveX (PipPPush.DLL) Crafted PostURL Request Multiple Method Arbitrary File Upload
8024| [49078] Microsoft Excel Embedded Formula Parsing Arbitrary Code Execution
8025| [49077] Microsoft Excel Calendar Object Validation VBA Performance Cache Processing Arbitrary Code Execution
8026| [49076] Microsoft Excel BIFF File Malformed Object Handling Arbitrary Code Execution
8027| [49068] Microsoft Host Integration Server (HIS) SNA RPC Request Remote Overflow
8028| [49061] Microsoft Windows Ancillary Function Driver (afd.sys) Local Privilege Escalation
8029| [49060] Microsoft Windows Message Queuing Service RPC Request Handling Remote Code Execution
8030| [49058] Microsoft Windows Active Directory LDAP(S) Request Handling Remote Overflow
8031| [49057] Microsoft Windows SMB File Name Handling Remote Underflow
8032| [49056] Microsoft Windows Kernel Memory Corruption Local Privilege Escalation
8033| [49055] Microsoft Windows Kernel New Window Creation Process Arbitrary Code Execution
8034| [49054] Microsoft Windows Kernel Double-free Unspecified Local Privilege Escalation
8035| [49053] Microsoft Windows Virtual Address Descriptors (VAD) Local Privilege Escalation
8036| [49052] Microsoft Office CDO Protocol (cdo:) Content-Disposition: Attachment Header XSS
8037| [48837] Microsoft Windows Vista Page Fault Handling DoS
8038| [48821] Microsoft Dynamics GP DPS Component DPS Message Remote Overflow
8039| [48820] Microsoft Dynamics GP DPM Component DPM Message Remote Overflow
8040| [48819] Microsoft Dynamics GP DPS Message Invalid Magic Number Remote DoS
8041| [48818] Microsoft IE Top Level Domain Cross-Domain Cookie Fixation
8042| [48789] Microsoft Windows Mobile Bluetooth Device Name Overflow DoS
8043| [48564] Apple Mac OS X QuickLook Microsoft Office File Handling Memory Corruption
8044| [48359] Microsoft Windows Vista ASLR / DEP Memory Protection Bypass
8045| [48302] Microsoft Windows nslookup.exe DNS Zone Transfer Request Unspecified Arbitrary Code Execution
8046| [48220] Microsoft SQL Server SQLVDIRLib.SQLVDirControl ActiveX (Tools\Binn\sqlvdir.dll) Connect Method Overflow
8047| [48153] Microsoft Windows srv.sys WRITE_ANDX SMB Packet Handling Remote DoS
8048| [48037] Microsoft Windows Image Acquisition Logger ActiveX Open Method Arbitrary File Download
8049| [48009] Microsoft Windows Kernel IopfCompleteRequest API Overflow
8050| [48000] Microsoft Organization Chart orgchart.exe Crafted OPX File Handling DoS
8051| [47969] Microsoft Multiple Products GDI+ BMP Integer Calculation Overflow
8052| [47968] Microsoft Multiple Products GDI+ WMF Image Handling Overflow
8053| [47967] Microsoft Multiple Products GDI+ GIF Image Handling Arbitrary Code Execution
8054| [47966] Microsoft Multiple Products GDI+ EMF File Handling Memory Corruption
8055| [47965] Microsoft Multiple Products GDI+ VML Gradient Size Handling Overflow
8056| [47964] Microsoft Office OneNote Protocol Handler (onenote://) URI Handling Arbitrary Code Execution
8057| [47963] Microsoft Windows Media Player Audio File Sampling Rate Remote Code Execution
8058| [47962] Microsoft Windows Media Encoder wmex.dll ActiveX Overflow
8059| [47856] Microsoft BitLocker BIOS Keyboard Buffer Local Password Disclosure
8060| [47475] Microsoft Visual Studio Masked Edit Control ActiveX (Msmask32.ocx) Mask Parameter Overflow
8061| [47419] Microsoft IE HTML Object Unspecified Memory Corruption
8062| [47418] Microsoft IE HTML Object Unspecified Memory Corruption
8063| [47417] Microsoft IE Object Handling Uninitialized Memory Corruption
8064| [47416] Microsoft IE HTML Document Objects Handling Memory Corruption
8065| [47415] Microsoft IE HTML Document Object Handling Memory Corruption
8066| [47414] Microsoft IE Print Preview HTML Component Handling Unspecified Arbitrary Code Execution
8067| [47413] Microsoft IE MHTML Protocol Handler Cross-Domain Information Disclosure
8068| [47412] Microsoft Windows Event System Crafted Request Array Index Handling Remote Privilege Escalation
8069| [47411] Microsoft Windows Event System Per-user Subscription Crafted Request Remote Privilege Escalation
8070| [47410] Microsoft Office Excel connections.xml Password String Persistence
8071| [47409] Microsoft Office Excel Spreadsheet AxesSet Record Memory Corruption
8072| [47408] Microsoft Office Excel File FORMAT Record Array Index Handling Arbitrary Code Execution
8073| [47407] Microsoft Office Excel File COUNTRY Record Value Parsing Arbitrary Code Execution
8074| [47406] Microsoft PowerPoint Viewer Cstring Object Handling Memory Corruption
8075| [47405] Microsoft PowerPoint Viewer Picture Index Handling Memory Corruption
8076| [47404] Microsoft PowerPoint File List Value Handling Memory Corruption
8077| [47403] Microsoft Windows Messenger ActiveX (Messenger.UIAutomation.1) Remote Privileged Operations
8078| [47402] Microsoft Office Filters PICT File Handling Arbitrary Code Execution
8079| [47401] Microsoft Office Filters Encapsulated PostScript (EPS) File Handling Arbitrary Code Execution
8080| [47400] Microsoft Office BMPIMP32.FLT Filter BMP File Header Handling Arbitrary Code Execution
8081| [47398] Microsoft Office Filters PICT File bits_per_pixel Field Heap Corruption
8082| [47397] Microsoft Office WPGIMP32.FLT Filter WordPerfect Graphics (WPG) File Handling Arbitrary Code Execution
8083| [47396] Microsoft Windows IPsec Policy Import Failure Cleartext Remote Information Disclosure
8084| [47395] Microsoft Windows Image Color Management System (MSCMS) mscms.dll InternalOpenColorProfile Function ICM Image File Handling Overflow
8085| [47299] Frisk F-PROT Antivirus Microsoft Office File Handling DoS
8086| [47004] Microsoft Crypto API S/MIME X.509 Certificate CRL Check Remote Information Disclosure
8087| [46990] Microsoft Windows Explorer (explorer.exe) Unspecified WMF Handling DoS
8088| [46935] Microsoft IE Pop Up Blocker Multiple Issues
8089| [46931] Microsoft Outlook/Express Unspecified URI Handling Arbitrary Command Injection
8090| [46914] Microsoft Word DOC File Handling Unspecified Arbitrary Code Execution
8091| [46827] Microsoft Visual Basic ActiveX (vb6skit.dll) fCreateShellLink Function Crafted lpstrLinkPath Argument Overflow
8092| [46801] Microsoft Windows Calendar Malformed ICS File Handling DoS
8093| [46780] Microsoft Outlook Web Access (OWA) HTML Parsing Unspecified XSS
8094| [46779] Microsoft Outlook Web Access (OWA) Data Validation Unspecified XSS
8095| [46778] Microsoft Windows DNS Query ID Field Prediction Cache Poisoning
8096| [46777] Microsoft Windows DNS Socket Entropy Weakness Cache Poisoning
8097| [46774] Microsoft Windows Explorer Saved Search File Handling DoS
8098| [46773] Microsoft SQL Server Memory Page Reuse Information Disclosure
8099| [46772] Microsoft SQL Server Convert Function Overflow
8100| [46771] Microsoft SQL Server Stored Backup File Processing Memory Corruption Arbitrary Code Execution
8101| [46770] Microsoft SQL Server Crafted Insert Statement Overflow
8102| [46749] Microsoft Access Snapshot Viewer ActiveX (snapview.ocx) PrintSnapshot Method Arbitrary Code Execution
8103| [46645] Microsoft Word DOC File Unordered List Handling Memory Corruption
8104| [46631] Microsoft IE Frame Location Handling Cross-frame Content Manipulation
8105| [46630] Microsoft IE location Window Object Handling XSS
8106| [46210] Microsoft Windows Installer msiexec.exe /uninstall Option GUID Value Overflow
8107| [46084] Microsoft IE Request Header Handling Cross-domain Information Disclosure
8108| [46083] Microsoft IE HTML Object Handling Memory Corruption Arbitrary Code Execution
8109| [46068] Microsoft Windows Pragmatic General Multicast (PGM) Fragment Handling Remote DoS
8110| [46067] Microsoft Windows Pragmatic General Multicast (PGM) Packet Handling Remote DoS
8111| [46066] Microsoft Windows Active Directory LDAP Request Processing Remote DoS
8112| [46065] Microsoft DirectX SAMI File Format Processing Arbitrary Code Execution
8113| [46064] Microsoft DirectX MJPEG Codec AVI/ASF File Processing Arbitrary Code Execution
8114| [46063] Microsoft Windows Internet Name Service (WINS) Packet Handling Local Privilege Escalation
8115| [46062] Microsoft Windows Speech Components (sapi.dll) Speech Recognition Code Execution
8116| [46061] Microsoft Windows Bluetooth SDP Packet Processing Remote Code Execution
8117| [45906] Microsoft ISA Server SOCKS4 Proxy Empty Packet Cross Session Destination IP Disclosure
8118| [45826] Microsoft IE Local Zone Saved File URI XSS
8119| [45814] Microsoft IE Arbitrary Website Zone Addition Domain Supression DoS
8120| [45813] Microsoft IE URI Arbitrary Scheme Name XSS Filter Bypass
8121| [45809] Microsoft Windows Vista Kernel Unspecified Remote Issue
8122| [45806] Microsoft Register Server (REGSVR) Crafted DLL Handling Unspecified Issue
8123| [45525] Microsoft IE Failed Connection DNS Pin Dropping Rebinding Weakness
8124| [45523] Microsoft Windows Live Messenger GDI Engine Malformed File Handling Overflow
8125| [45521] Microsoft Windows Explorer (explorer.exe) Malformed PNG Handling Remote DoS
8126| [45442] Microsoft IE IObjectSafety Java Plug-in ActiveX COM Object Creation DoS
8127| [45441] Microsoft IE IObjectSafety CLSID_ApprenticeICW ActiveX Control COM Object Creation DoS
8128| [45440] Microsoft IE IObjectSafety SmartConnect Class ActiveX Control COM Object Creation DoS
8129| [45439] Microsoft IE IObjectSafety System Monitor Source Properties ActiveX Control COM Object Creation DoS
8130| [45438] Microsoft IE IObjectSafety Outlook Progress Ctl ActiveX Control COM Object Creation DoS
8131| [45437] Microsoft IE Location DOM Object Page Load Interruption Site/Certificate Spoofing
8132| [45436] Microsoft IE URI Unspecified Scheme Traversal Arbitrary File Access
8133| [45435] Microsoft IE file: URI Absolute Traversal Arbitrary File Access
8134| [45280] Microsoft Windows Media Player (WMP) mplay32.exe MP3 Filename Handling Local Overflow
8135| [45264] Microsoft Office Publisher File Format Unspecified Remote Code Execution
8136| [45262] Microsoft ISA Server Host Header Log File Content Injection
8137| [45260] Microsoft IE Malformed Table Element CSS Attribute Handling DoS
8138| [45259] Microsoft IE mshtml.dll Malformed IFRAME XML File / XSL Stylesheet Handling DoS
8139| [45248] Microsoft IE JavaScript onUnload Document Structure Modification DoS
8140| [45218] Microsoft Outlook Web Access Cache-Control Directive Information Caching Persistence
8141| [45185] Microsoft Baseline Security Analyzer (MBSA) Reboot Race Condition Weakness
8142| [45074] Microsoft IE Print Table of Links Cross-Zone Scripting
8143| [45048] Microsoft Windows XP I2O Utility Filter Driver (i2omgmt.sys) Local Privilege Escalation
8144| [45033] Microsoft Publisher Object Handler Header Data Validation Arbitrary Code Execution
8145| [45032] Microsoft Word Document Malformed CSS Handling Memory Corruption Arbitrary Code Execution
8146| [45031] Microsoft Office RTF File Handling Object Parsing Arbitrary Code Execution
8147| [45028] Microsoft Malware Protection Engine File Parsing Disk-space Exhaustion DoS
8148| [45027] Microsoft Malware Protection Engine File Parsing Service DoS
8149| [45008] Microsoft Outlook E-mail Message Malformed Header / Body Separation Remote DoS
8150| [44985] RSA Authentication Agent WebID/IISWebAgentIF.dll FTP url Variable Arbitrary Site Redirect
8151| [44984] RSA Authentication Agent IISWebAgentIF.dll postdata Parameter URL-Encoded XSS
8152| [44979] Microsoft SQL Server Blank sa Password Set Weakness
8153| [44975] Microsoft Windows CE GIF Imaging Component Unspecified Arbitrary Code Execution
8154| [44974] Microsoft Windows CE JPEG (GDI+) Handling Unspecified Arbitrary Code Execution
8155| [44973] Microsoft IE DisableCachingOfSSLPages SSL Page Caching Persistence
8156| [44959] Microsoft Office on Mac OS X Installation Permission Bypass
8157| [44938] Microsoft Office Open XML (OOXML) Document Metadata Field Modification Signature Weakness
8158| [44880] Microsoft Windows msjet40.dll MDB File Handling Overflow
8159| [44652] Microsoft HeartbeatCtl HRTBEAT.OCX ActiveX Unspecified Method Host Argument Overflow
8160| [44580] Microsoft Windows Microsoft Distributed Transaction Coordinator (MSDTC) SeImpersonatePrivilege User Right Local Privilege Escalation
8161| [44459] Microsoft Sharepoint Rich Text Editor Picture Source XSS
8162| [44458] Microsoft Works WkImgSrv.dll WksPictureInterface Property Remote DoS
8163| [44319] Microsoft Office Publisher Crafted PUB File Handling DoS
8164| [44303] Microsoft IE body Tag Infinite Loop DoS
8165| [44215] Microsoft Windows GDI EMF Filename Parameter Handling Overflow
8166| [44214] Microsoft Windows GDI WMF Handling CreateDIBPatternBrushPt Function Overflow
8167| [44213] Microsoft Windows GDI (gdi32.dll) EMF File Handling Multiple Overflows
8168| [44212] Microsoft Project File Handling Unspecified Arbitrary Code Execution
8169| [44211] Microsoft Vbscript.dll VBScript Decoding Code Execution
8170| [44210] Microsoft Jscript.dll JScript Arbitrary Code Execution
8171| [44206] Microsoft Windows Kernel Unspecified Privilege Escalation
8172| [44205] Microsoft IE Data Stream Handling Memory Corruption
8173| [44200] Microsoft Windows Random Number Generator (RNG) CryptGenRandom Function Prediction Weakness
8174| [44172] Microsoft Windows DNS Client Predictable Transaction ID Spoofing
8175| [44171] Microsoft Windows HxTocCtrl ActiveX (hxvz.dll) Memory Corruption
8176| [44170] Microsoft Visio DXF File Handling Memory Validation Arbitrary Code Execution
8177| [44169] Microsoft Visio Object Header Data Handling Arbitrary Code Execution
8178| [44150] Microsoft Access Crafted MDB File Handling Overflow
8179| [44018] Microsoft Windows Vista SP1 Page Protection Unspecified Bypass
8180| [43844] RSA SecurID WebID RSA Authentication Agent (IISWebAgentIF.dll) postdata Variable Blacklist Bypass
8181| [43773] Microsoft Windows Explorer (explorer.exe) GIF File Handling Remote DoS
8182| [43715] Microsoft Windows Media Player (WMP) AIFF File Handling DoS
8183| [43606] Microsoft IE XMLHttpRequest() Multiple Header Overwrite HTTP Response Splitting
8184| [43605] Microsoft IE Chunked Transfer-Encoding Request Smuggling
8185| [43603] Microsoft Windows DNS Server Dynamic Update Mechanism Client Authentication Bypass
8186| [43521] Microsoft IE CSS :visited Pseudo-class Browser History Disclosure
8187| [43471] Microsoft IE Digest Authentication username Attribute CRLF Injection
8188| [43464] Microsoft Jet Database Engine Word File Handling Unspecified Code Execution
8189| [43434] Microsoft Windows Vista NoDriveTypeAutoRun Auto-Play Bypass
8190| [43325] Microsoft Atlas Framework JavaScript Object Notation (JSON) Crafted HTML Remote Data Disclosure
8191| [43314] Microsoft IE JavaScript Long String Regex Match Remote DoS
8192| [43307] Microsoft Windows Explorer (explorer.exe) AVI Handling Right-Click Action DoS
8193| [43068] Microsoft Access MDB File Handling Unspecified Arbitrary Code Execution
8194| [42920] Hosting Controller /IIS/iibind.asp Arbitrary Site Host Header Manipulation
8195| [42799] Microsoft IE URI Handling Arbitrary FTP Command Injection
8196| [42732] Microsoft Excel Macro Validation Unspecified Code Execution
8197| [42731] Microsoft Excel Conditional Formatting Value Unspecified Code Execution
8198| [42730] Microsoft Excel BIFF File Format Rich Text Tag Malformed Tag Memory Corruption
8199| [42725] Microsoft Excel XLS Malformed Formula Memory Corruption
8200| [42724] Microsoft Excel Style Record Handling Memory Corruption
8201| [42723] Microsoft Excel SLK File Import Unspecified Arbitrary Code Execution
8202| [42722] Microsoft Excel BIFF8 Spreadsheet DVAL Record Handling Arbitrary Code Execution
8203| [42712] Microsoft Office Web Components DataSource Page Handling Arbitrary Code Execution
8204| [42711] Microsoft Office Web Components URL Parsing Arbitrary Code Execution
8205| [42710] Microsoft Outlook mailto: URI Handling Arbitrary Command Execution
8206| [42709] Microsoft Office Unspecified Malformed Document Handling Memory Corruption
8207| [42708] Microsoft Office Excel Document (XLS) Cell Record Rebuilding Memory Corruption
8208| [42579] 3ivx MPEG-4 on Microsoft Windows Media Player (WMP) mplayer2.exe MP4 File Handling Overflow
8209| [42152] Microsoft Silverlight ActiveX Unspecified Overflow
8210| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
8211| [41553] Microsoft Windows Explorer BMP Width Dimension Handling Overflow
8212| [41491] Microsoft Windows Vista Crafted DHCP Response DoS
8213| [41468] Microsoft FoxPro ActiveX Web Page Parsing Unspecified Memory Corruption
8214| [41467] Microsoft IE Image Processing Argument Validation Unspecified Memory Corruption
8215| [41466] Microsoft IE animateMotion.by SVG Element by Property Memory Corruption
8216| [41465] Microsoft IE HTML Layout Rendering Unspecified Memory Corruption
8217| [41464] Microsoft Word Document Handling Unspecified Memory Corruption
8218| [41463] Microsoft Windows OLE Automation Unspecified Memory Corruption Remote Code Execution
8219| [41462] Microsoft Office Malformed Object Parsing Memory Corruption
8220| [41461] Microsoft Active Directory / ADAM Malformed LDAP Request Remote DoS
8221| [41460] Microsoft WebDAV Mini-Redirector Response Handling Arbitrary Code Execution
8222| [41459] Microsoft Works File Converter .wps File Multiple Field Handling Arbitrary Code Execution
8223| [41458] Microsoft Works File Converter .wps File Header Index Table Handling Arbitrary Code Execution
8224| [41457] Microsoft Works File Converter .wps Format Header Handling Arbitrary Code Execution
8225| [41447] Microsoft Office Publisher Memory Index Validation .pub File Handling Arbitrary Code Execution
8226| [41446] Microsoft Office Publisher .pub File Handling Arbitrary Code Execution
8227| [41382] Microsoft IE OnKeyDown JavaScript htmlFor Attribute Keystroke Disclosure
8228| [41156] Microsoft Windows x64 Kernel PatchGuard Bypass
8229| [41155] Microsoft Windows Hardware-enforced DEP Bypass
8230| [41154] Microsoft Windows XP EFS Cleartext Password Storage
8231| [41097] Microsoft Windows Task Scheduler (at.exe) Local Privilege Escalation
8232| [41093] Microsoft Windows Media Player (WMP) MSIE Static Invocation HTML Rendering Weakness
8233| [41092] Microsoft Windows DNS Service Predictable Transaction ID Weakness
8234| [41090] Microsoft Windows w/ IE7 Shell32.dll Crafted URL Third-party Application Arbitrary Command Execution
8235| [41080] Microsoft Visual Database Tools MSVDTDatabaseDesigner7 ActiveX (VDT70.DLL) NotSafe Function Arbitrary Code Execution
8236| [41065] Microsoft Windows kernel32.dll Multiple Function DoS
8237| [41064] Microsoft Windows ntdll.dll Multiple Function DoS
8238| [41060] Microsoft .NET Unspecified XSS Filter Bypass
8239| [41059] Microsoft Windows ARP Saturation Remote DoS
8240| [41053] Microsoft Visual Basic vbp File Company Name Field Processing Overflow
8241| [41052] Microsoft Visual Basic vbp File Description Field Processing Overflow
8242| [41048] Microsoft IE Content-Disposition HTML File Handling XSS
8243| [41047] Microsoft IE mshtml Malformed HTML Tag DoS
8244| [41041] Microsoft IE Mouse Click self.resizeTo DoS
8245| [41040] Microsoft IE onclick Self Referencing Button Infinite Loop DoS
8246| [41036] Microsoft IE DLL Search Path Subversion Local Privilege Escalation
8247| [41035] Microsoft IE onload Localhost DoS
8248| [41026] Microsoft IE GET Request Overflow
8249| [41025] Microsoft IE Drag and Drop Arbitrary Program Execution
8250| [41024] Microsoft IE Cross Zone Domain Resolution Weakness
8251| [40735] Apple Mac OS X Microsoft Office Spotlight Importer XLS Handling Memory Corruption
8252| [40531] Microsoft Visual Basic DSR File Handling Remote Code Execution
8253| [40381] Microsoft Visual FoxPro VFP_OLE_Server ActiveX foxcommand Method Arbitrary Code Execution
8254| [40380] Microsoft Visual FoxPro ActiveX (vfp6r.dll) DoCmd Method Arbitrary Command Execution
8255| [40352] Microsoft Visual InterDev SLN File Long Project Line Arbitrary Code Execution
8256| [40344] Microsoft Excel Malformed Header File Handling Remote Code Execution
8257| [40234] Microsoft Rich Textbox Control (RICHTX32.OCX) SaveFile Method Arbitrary File Overwrite
8258| [40071] Microsoft Windows LSASS Crafted LPC Request Local Privilege Escalation
8259| [40070] Microsoft Windows TCP/IP IGMPv3 / MLDv2 Packet Handling Remote Code Execution
8260| [40069] Microsoft Windows TCP/IP ICMP RDP Packet Handling Remote DoS
8261| [39900] Microsoft Web Proxy Auto-Discovery (WPAD) Crafted DNS MitM Weakness
8262| [39521] Cisco Security Agent for Microsoft Windows Crafted SMB Packet Remote Overflow
8263| [39131] Microsoft Windows Media Player Crafted AU File Application Crash Remote DoS
8264| [39127] Microsoft Windows DirectX WAV / AVI File Parsing Arbitrary Code Execution
8265| [39126] Microsoft Windows DirectX SAMI File Parsing Arbitrary Code Execution
8266| [39125] Microsoft Windows Vista SMBv2 Signing Unspecified Remote Code Execution
8267| [39124] Microsoft Windows Vista Kernel Legacy Reply Path Validation Local Privilege Escalation
8268| [39123] Microsoft Windows Message Queuing MSMQ Message Handling Arbitrary Code Execution
8269| [39122] Microsoft Windows Media Format Runtime ASF Parsing Arbitrary Code Execution
8270| [39121] Microsoft IE DHTML Object Memory Corruption
8271| [39120] Microsoft IE Element Tag Uninitialized Memory Corruption
8272| [39119] Microsoft IE Object cloneNode / nodeValue Function Uninitialized Memory Corruption
8273| [39118] Microsoft IE Object setExpression Function Memory Corruption
8274| [39014] Microsoft Windows RunAs Command Local Arbitrary Process DoS
8275| [38991] Microsoft Windows PNG Image IHDR block Multiple Crafted Value Remote DoS
8276| [38955] Microsoft IE history.length Variable History Disclosure
8277| [38954] Microsoft Excel Sheet Name Unspecified Code Execution
8278| [38953] Microsoft IE Document Variable Overwrite Same Origin Policy Bypass
8279| [38499] Microsoft Windows Mobile ActiveSync USB Weak PIN/Password Encryption
8280| [38497] Microsoft IE Page Transaction Race Condition Arbitrary Code Execution
8281| [38496] Microsoft Sysinternals DebugView Dbgv.sys Local Privilege Escalation
8282| [38495] Microsoft IE Outlook Express Address Book Activex DoS
8283| [38494] Microsoft Windows Graphics Device Interface (GDI+, GdiPlus.dll) ICO Handling DoS
8284| [38493] Microsoft IE HTML Popup Window (mshtml.dll) DoS
8285| [38488] Microsoft ISA Server File Extension Filter Bypass
8286| [38487] Microsoft Visual FoxPro ActiveX (FPOLE.OCX) FoxDoCmd Function Arbitrary Command Execution
8287| [38486] Microsoft Expression Media IVC File Cleartext Catalog Password Disclosure
8288| [38471] Microsoft Office MSODataSourceControl ActiveX DeleteRecordSourceIfUnused Method Overflow
8289| [38399] Microsoft SQL Server Enterprise Manager Distributed Management Objects OLE DLL ActiveX (sqldmo.dll) Start Method Arbitrary Code Execution
8290| [38212] Microsoft IE document.open() Function Address Bar Spoofing
8291| [38211] Microsoft IE with Netscape navigatorurl URI Cross-browser Command Execution
8292| [38018] Microsoft IE with Mozilla SeaMonkey Cross-browser Command Execution
8293| [38017] Microsoft IE with Mozilla Firefox Cross-browser Command Execution
8294| [37638] Microsoft IE res:// URI Image Object Local File Enumeration
8295| [37637] Microsoft Windows Crafted HLP File Overflow
8296| [37636] Microsoft IE Crafted JavaScript for Loop Null Pointer DoS
8297| [37635] Microsoft Windows Virtual DOS Machine (VDM) PhysicalMemory Race Condition Local Privilege Escalation
8298| [37634] Microsoft Word Crafted Document Unspecified Resource Consumption DoS
8299| [37633] Microsoft Word wwlib.dll Crafted Document Overflow DoS
8300| [37632] Microsoft Word Unspecified Memory Corruption
8301| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
8302| [37630] Microsoft SharePoint PATH_INFO (query string) XSS
8303| [37629] Microsoft Windows 2000 RPC Authentication Unspecified Information Disclosure
8304| [37628] Microsoft Windows 2000 RPC Authentication Crafted Request Remote DoS
8305| [37627] Microsoft Windows Kodak Image Viewer Image File Handling Arbitrary Code Execution
8306| [37626] Microsoft IE Unspecified Address Bar Spoofing
8307| [37625] Microsoft IE File Download Queue Handling Use-After-Free Arbitrary Code Execution
8308| [37148] Microsoft TSAC ActiveX connect.asp Unknown XSS
8309| [37107] Microsoft Visual Studio VB To VSI Support Library ActiveX (VBTOVSI.DLL) SaveAs Method Arbitrary File Manipulation
8310| [37106] Microsoft Visual Studio ActiveX (PDWizard.ocx) Multiple Method Arbitrary Program Execution
8311| [37105] Microsoft Windows mfc42.dll / mfc42u.dll CFileFind Class FindFile() Function Overflow
8312| [36938] Microsoft Windows XP Kernel Process Scheduler Local DoS
8313| [36937] Microsoft Windows / IE ActiveX (triedit.dll) Multiple Property NULL Pointer DoS
8314| [36936] Microsoft Visual Basic VBP File Handling Overflow
8315| [36935] Microsoft Windows Services for UNIX Local Privilege Escalation
8316| [36934] Microsoft Agent URL Handling Remote Code Execution
8317| [36847] PHP iisfunc Extension php_iisfunc.dll Multiple Function Overflow
8318| [36400] Microsoft IE HTML FTP Credential Disclosure
8319| [36399] Microsoft DirectX Media SDK DXSurface.LivePicture.FlashPix.1 (DirectTransform FlashPix) ActiveX SourceUrl Property Overflow
8320| [36398] Microsoft IE FTP Unspecified Remote Memory Address Disclosure
8321| [36397] Microsoft IE Crafted CSS Unspecified Memory Corruption
8322| [36396] Microsoft IE ActiveX tblinf32.dll Unspecified Arbitrary Code Execution
8323| [36395] Microsoft IE ActiveX (pdwizard.ocx) Unspecified Memory Corruption
8324| [36394] Microsoft XML Core Services (MSXML) Multiple Object Handling Overflow
8325| [36393] Microsoft Windows Vista Weather Gadgets Crafted HTML Attribute Unspecified Issue
8326| [36392] Microsoft Windows Vista Contacts Gadget Crafted Contact Information Arbitrary Code Execution
8327| [36391] Microsoft Windows Vista Feed Headlines Gadgets RSS Feed XSS
8328| [36390] Microsoft Windows Vector Markup Language (VML) VGX.DLL CDownloadSink Class Overflow
8329| [36389] Microsoft Virtual PC Guest Administrator Unspecified Local Privilege Escalation
8330| [36388] Microsoft Windows Graphics Rendering Engine (GDI) Metafile Image Handling Overflow
8331| [36387] Microsoft Windows OLE Automation TextNode Object substringData Method Overflow
8332| [36386] Microsoft Windows Media Player Skin File Handling Crafted Header Arbitrary Code Execution
8333| [36385] Microsoft Windows Media Player Skin File Handling Overflow
8334| [36383] Microsoft Excel Workspace rtWnDesk Record Memory Corruption
8335| [36151] Microsoft DirectX RLE Compressed Targa Image Processing Overflow
8336| [36149] Microsoft IE on Windows Mobile Unspecified Overflow DoS
8337| [36148] Microsoft Windows Mobile Pictures and Videos Malformed JPEG DoS
8338| [36147] Microsoft IE Zone Domain Specification DoS
8339| [36146] Microsoft Windows Terminal Services TLS Downgrade Weakness
8340| [36145] Microsoft Windows Event Viewer (eventvwr.exe) Log Data Exclusion
8341| [36144] Microsoft Windows Bluetooth Unspecified Remote Privilege Escalation
8342| [36143] Microsoft Windows Mobile Pocket PC Edition Unspecified Remote Privilege Escalation
8343| [36142] Microsoft IE IDN Site Basic Authentication Status Bar Truncation Spoofing
8344| [36141] Microsoft Windows Explorer Ole32.dll Crafted Document Summary Information DoS
8345| [36138] Microsoft Windows Active Directory Time Restriction User Enumeration
8346| [36034] Microsoft Office 2000 Controllo ActiveX (OUACTRL.OCX) HelpPopup Method Overflow
8347| [35962] Microsoft Windows XP Registry QHEADLES Permission Weakness
8348| [35961] Microsoft Windows Active Directory LDAP Service Crafted Request Remote DoS
8349| [35960] Microsoft Windows Active Directory LDAP Service Convertible Attribute Remote Code Execution
8350| [35959] Microsoft Excel Viewer WorkBook Workspace Designation Memory Corruption
8351| [35958] Microsoft Excel Multiple Worksheet Unspecified Memory Corruption
8352| [35957] Microsoft Excel Version Information Validation Crafted File Arbitrary Code Execution
8353| [35956] Microsoft .NET Framework Just In Time (JIT) Compiler Service Unspecified Arbitrary Code Execution
8354| [35955] Microsoft .NET Framework NULL Byte URL Arbitrary File Access
8355| [35954] Microsoft .NET Framework PE Loader Service Unspecified Arbitrary Code Execution
8356| [35953] Microsoft Office Publisher .pub Page Data Handling Arbitrary Code Execution
8357| [35952] Microsoft Windows Vista Teredo Crafted IPv6 Traffic Blocking Rule Bypass
8358| [35763] Microsoft PowerPoint Unspecified Arbitrary Code Execution
8359| [35637] Microsoft Windows Unspecified Remote Code Execution
8360| [35568] Microsoft IE Script Variable Length DoS
8361| [35353] Microsoft IE Speech API 4 Xlisten.dll / Xvoice.dll Memory Corruption
8362| [35352] Microsoft IE navcancl.htm res: URI Phishing
8363| [35351] Microsoft IE Unspecified Memory Corruption Arbitrary Code Execution
8364| [35350] Microsoft IE Multiple Language Pack Installation Race Condition Code Execution
8365| [35349] Microsoft IE Crafted CSS Tag Handling Memory Corruption
8366| [35348] Microsoft IE Urlmon.dll COM Object Instantiation Memory Corruption
8367| [35347] Microsoft Windows Schannel Security Package Crafted Digital Signature Arbitrary Code Execution
8368| [35346] Microsoft Outlook Express / Windows Mail MHTML Content Disposition Parsing Cross Domain Information Disclosure
8369| [35345] Microsoft Outlook Express / Windows Mail URL Parsing Cross Domain Information Disclosure
8370| [35344] Microsoft Windows Vista Local User Information Data Stores Information Disclosure
8371| [35343] Microsoft Visio Document Handling Crafted Packed Object Arbitrary Code Execution
8372| [35342] Microsoft Visio Document Handling Crafted Version Number Arbitrary Code Execution
8373| [35341] Microsoft Windows Win32 API Unspecified Remote Code Execution
8374| [35269] Microsoft ASP .NET Framework Comment Enclosure Handling Request Weakness
8375| [34963] Microsoft IE CCRP BrowseDialog Server (ccrpbds6.dll) ActiveX Multiple Property DoS
8376| [34959] Microsoft Xbox 360 Hypervisor Syscall Bypass Arbitrary Code Access
8377| [34885] Apache Tomcat on IIS Servlet Engine MS-DOS Device Request DoS
8378| [34830] Microsoft Outlook Recipient ActiveX (ole32.dll) Crafted HTML DoS
8379| [34490] Microsoft Windows Explorer Folder Browsing WMV Handling DoS
8380| [34489] Microsoft Office 2003 Malformed WMF File Handling DoS
8381| [34488] Microsoft Excel 2003 XLS Handling Corrupt Format DoS
8382| [34407] Adobe Acrobat Reader Plugin for Microsoft IE Microsoft.XMLHTTP ActiveX CLRF Injection
8383| [34404] Microsoft IE Media Service Component Arbitrary File Rewrite
8384| [34403] Microsoft IE HTML CMarkup Objects Unspecified Memory Corruption
8385| [34402] Microsoft IE HTML Objects Unspecified Memory Corruption
8386| [34401] Microsoft IE Property Method Handling Memory Corruption
8387| [34400] Microsoft IE Uninitialized Object Memory Corruption
8388| [34399] Microsoft IE COM Object Instantiation Memory Corruption (931768)
8389| [34397] Microsoft CAPICOM CAPICOM.Certificates ActiveX (CAPICOM.dll) Remote Code Execution
8390| [34396] Microsoft Office Crafted Drawing Object Arbitrary Code Execution
8391| [34395] Microsoft Excel Filter Record Handling Remote Code Execution
8392| [34394] Microsoft Office Excel Set Font Handling Remote Code Execution
8393| [34393] Microsoft Excel BIFF Record Named Graph Record Parsing Overflow
8394| [34392] Microsoft Exchange Server IMAP Literal Processing DoS
8395| [34391] Microsoft Exchange Server MIME Decoding Remote Code Execution
8396| [34390] Microsoft Exchange Server MODPROPS Malformed iCal DoS
8397| [34389] Microsoft Exchange Outlook Web Access (OWA) Attachment Script Injection
8398| [34388] Microsoft Word RTF Rich Text Properties Parsing Remote Code Execution
8399| [34387] Microsoft Word Data Array Handling Remote Code Execution
8400| [34386] Microsoft Word Malformed Drawing Object Arbitrary Code Execution
8401| [34385] Microsoft Word Macro Content Arbitrary Code Execution
8402| [34103] Microsoft Windows Web Proxy Autodiscovery Protocol (WPAD) DNS Subversion
8403| [34102] Microsoft Windows Vista Mail Client Crafted Link Arbitrary Program Execution
8404| [34101] Microsoft Windows XP winmm.dll mmioRead Function DoS
8405| [34100] Microsoft Windows DNS RPC Interface Zone Name Remote Overflow
8406| [34099] Microsoft Windows TrueType Fonts Rasterizer Local Privilege Escalation
8407| [34098] Microsoft Windows GDI Functions Windows Metafile (WMF) Handling DoS
8408| [34097] Microsoft Windows GDI Enhanced Metafile (EMF) Handling Local Privilege Escalation
8409| [34096] Microsoft Windows GDI Invalid Window Size Local Privilege Escalation
8410| [34095] Microsoft Windows GDI Crafted Image Local Privilege Escalation
8411| [34077] Microsoft IE navcancl.htm res: URI XSS
8412| [34039] Adobe JRun IIS 6 Connector Unspecified File Request DoS
8413| [34011] Microsoft Windows Kernel Mapped Memory Local Privilege Escalation
8414| [34010] Microsoft Windows XP UPnP Remote Memory Corruption
8415| [34009] Microsoft Windows Agent URL Parsing Memory Corruption
8416| [34008] Microsoft Windows Vista CSRSS Local Privilege Escalation
8417| [34007] Microsoft Content Management Server (CMS) Unspecified XSS
8418| [34006] Microsoft Content Management Server (CMS) Crafted HTTP Request Memory Corruption
8419| [33668] Microsoft Windows Vista Meeting Space DFSR.exe TCP Connection Persistence
8420| [33667] Microsoft Windows Vista Persistent Established Teredo Address
8421| [33666] Microsoft Windows Vista Teredo nonce Spoofing
8422| [33665] Microsoft Windows Vista Neighbor Discovery Crafted Neighbor Advertisement Redirect
8423| [33664] Microsoft Windows Vista Crafted Gratuitous ARP Overwrite DoS
8424| [33663] Microsoft Windows Vista LLTD Mapper HELLO Packet Spoofing
8425| [33662] Microsoft Windows Vista LLTD Mapper Real Source Field Host Spoofing
8426| [33661] Microsoft Windows Vista LLTD Responder Race Condition Host Spoofing
8427| [33660] Microsoft Windows Vista LLTD Mapper EMIT Packet Gathering Remote DoS
8428| [33639] Microsoft Class Package Export Tool (clspack.exe) Long String Overflow
8429| [33638] Microsoft ISA Server IPv6 Filter Rule Bypass
8430| [33635] AMD ATI Radeon for Microsoft Windows Vista atikmdag.sys Kernel Mode Driver DoS
8431| [33629] Microsoft IE Animated Cursor (.ani) Handling Arbitrary Command Execution
8432| [33628] Microsoft Windows NDISTAPI.sys Permission Weakness Local DoS
8433| [33627] Microsoft Vista Speech Recognition Web Page Arbitrary Command Execution
8434| [33626] Microsoft Visual C++ MSVCR80.DLL Time Functions Assertion Error
8435| [33474] Microsoft Windows ReadDirectoryChangesW API Function File System Information Disclosure
8436| [33307] Microsoft Windows Media MID Malformed Header Chunk DoS
8437| [33306] Microsoft Windows Explorer explorer.exe WMV File Handling DoS
8438| [33271] Microsoft Word Crafted Frame CSRF
8439| [33270] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution
8440| [33219] Microsoft Windows Live Messenger Gestual Emoticon Saturation CPU Consumption DoS
8441| [33196] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (934232)
8442| [32630] Microsoft IE Key Press Event Focus Redirection
8443| [32629] Microsoft IE on Windows Mobile Malformed WML Page Unspecified DoS
8444| [32628] Microsoft Windows / IE ActiveX (mshtml.dll) Multiple Property NULL Pointer DoS
8445| [32627] Microsoft IE msxml3 Module Nested Tag Race Condition DoS
8446| [32626] Microsoft IE Crafted res:// Forced 404 Page Reporting
8447| [32625] Microsoft IE res://ieframe.dll/invalidcert.htm Site Security Certificate Discrediting
8448| [32624] Microsoft IE mhtml Overflow DoS
8449| [32445] Microsoft Windows Workstation Service NetrWkstaUserEnum RPC Request DoS
8450| [32123] ColdFusion / JRun on IIS Double Encoded NULL Byte Request File Content Disclosure
8451| [32119] Microsoft IE Cross Domain Charset Inheritance Weakness
8452| [32087] Microsoft IE onunload Event Address Bar Spoofing
8453| [31901] Microsoft Office Unspecified String Handling Arbitrary Code Execution
8454| [31900] Microsoft Word Unspecified Memory Corruption Arbitrary Code Execution (929434)
8455| [31899] Microsoft Help Workshop HPJ File OPTIONS Section Overflow
8456| [31898] Microsoft Help Workshop Crafted .cnt File Handling Overflow
8457| [31897] Microsoft Windows CSRSS NtRaiseHardError Function Arbitrary Memory Disclosure
8458| [31896] Microsoft Project Server pdsrequest.asp GetInitializationData Request SQL Database Password Disclosure
8459| [31895] Microsoft IE Blnmgrps.dll COM Object Instantiation Memory Corruption
8460| [31894] Microsoft IE Htmlmm.ocx COM Object Instantiation Memory Corruption
8461| [31893] Microsoft IE Msb1fren.dll COM Object Instantiation Memory Corruption
8462| [31892] Microsoft IE FTP Server Response Parsing Memory Corruption
8463| [31891] Microsoft IE Imjpcksid.dll COM Object Instantiation Memory Corruption
8464| [31890] Microsoft Windows Shell New Hardware Local Privilege Escalation
8465| [31889] Microsoft Windows XP SP2 Image Aquisition Service Local Privilege Escalation
8466| [31888] Microsoft Malware Protection Engine PDF File Parsing Remote Code Execution
8467| [31887] Microsoft MFC Component RTF OLE Object Memory Corruption Remote Code Execution
8468| [31886] Microsoft RichEdit OLE Dialog RTF Memory Corruption Remote Code Execution
8469| [31885] Microsoft Windows OLE Dialog Memory Corruption Remote Code Execution
8470| [31884] Microsoft Windows HTML Help ActiveX Control Arbitrary Code Execution
8471| [31883] Microsoft Step-by-Step Interactive Training Bookmark Handling Remote Code Execution
8472| [31882] Microsoft MDAC ADODB.Connection ActiveX Control Execute Method Remote Code Execution
8473| [31805] XEROX WorkCentre Products Web User Interface Microsoft Networking Configuration Command Injection
8474| [31659] Microsoft Windows CSRSS MessageBox Function Privilege Escalation
8475| [31647] Microsoft IE Javascript IsComponentInstalled Overflow
8476| [31645] Microsoft Windows DNS Recursive Query DoS
8477| [31333] Microsoft IE Image File Embedded Content XSS
8478| [31332] Microsoft IE Scrollbar CSS Property DoS
8479| [31331] Microsoft IE mailto: Handler Arbitrary Command-Line Argument Modification
8480| [31330] Microsoft IE File:// URI src Tag IFrame DoS
8481| [31329] Microsoft IE DNS Pinning Intranet Server Arbitrary Javascript Execution
8482| [31328] Microsoft IE UTF-7 Encoded HTTP 404 Error Message XSS
8483| [31326] Microsoft IE HTML Table Tag style Attribute DoS
8484| [31325] Microsoft IE HTML Frame Tag Invalid src Attribute DoS
8485| [31324] Microsoft IE DirectAnimation ActiveX Multiple Unspecified
8486| [31323] Microsoft IE DIV Tag and HTML CSS Float Properties Arbitrary Code Execution
8487| [31322] Microsoft IE SSL Certificate Chain Validation MiTM Weakness
8488| [31321] Microsoft IE Javascript self.location Refresh DoS
8489| [31258] Microsoft Excel Palette Record Handling Overflow
8490| [31257] Microsoft Excel Column Record Heap Corruption Remote Code Execution
8491| [31256] Microsoft Excel Malformed String Handling Remote Code Execution
8492| [31255] Microsoft Excel IMDATA Record Handling Remote Code Execution
8493| [31254] Microsoft Outlook Advanced Find .oss File Handling Remote Code Execution
8494| [31253] Microsoft Outlook E-mail Header Processing Unspecified DoS
8495| [31252] Microsoft Outlook VEVENT Record Handling Remote Code Execution
8496| [31251] Microsoft Office 2003 Brazilian Portuguese Grammar Checker Arbitrary Code Execution
8497| [31250] Microsoft IE Vector Markup Language (VML) Remote Overflow
8498| [31249] Microsoft Excel Malformed Record Memory Access Code Execution
8499| [30997] Microsoft Windows .manifest File Handling Local DoS
8500| [30871] Microsoft Windows DRM drmstor.dll ActiveX Object StoreLicense Function Memory Corruption
8501| [30834] Microsoft IE URLMON.DLL Long URL HTTP Redirect Overflow
8502| [30826] Microsoft Visual Basic Click Event Procedure Overflow
8503| [30825] Microsoft Word Malformed Data Structure Handling Memory Corruption
8504| [30824] Microsoft Word Malformed String Memory Corruption
8505| [30823] Microsoft Windows Print Spooler (spoolsv.exe) RpcGetPrinterData Function DoS
8506| [30822] Microsoft IE A Tag Long Title Attribute DoS
8507| [30821] Microsoft Outlook Express Windows Address Book Contact Record Code Execution
8508| [30820] Microsoft Word mso.dll / mso9.dll LsCreateLine Function DoS
8509| [30819] Microsoft Windows Media Player ASX Playlist Handling Overflow
8510| [30818] Microsoft Windows Media Player ASF Parsing Overflow
8511| [30817] Microsoft Windows Remote Installation Service TFTP Arbitrary File Overwrite
8512| [30816] Microsoft IE TIF Folder Cached Content Information Disclosure
8513| [30815] Microsoft IE TIF Folder Drag and Drop Operation Information Disclosure
8514| [30814] Microsoft IE DHTML Script Function Memory Corruption
8515| [30813] Microsoft IE Script Error Handling Memory Corruption
8516| [30811] Microsoft Windows SNMP Service Remote Overflow
8517| [30405] Microsoft Windows Active Directory Unspecified DoS
8518| [30402] Microsoft w3wp Crafted COM Component Request DoS
8519| [30263] Microsoft Windows Workstation Service Crafted Message Remote Overflow
8520| [30262] Microsoft Windows Agent ACF File Handling Memory Corruption
8521| [30261] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote DoS
8522| [30260] Microsoft Windows Client Service for NetWare (CSNW) Crafted Message Remote Code Execution
8523| [30214] Microsoft Windows GDI Kernel Structure Modification Code Execution
8524| [30208] Microsoft XMLHTTP ActiveX Control setRequestHeader Method Arbitrary Code Execution
8525| [30155] Microsoft Visual Studio WMI Object Broker ActiveX (WmiScriptUtils.dll) Unspecified Code Execution
8526| [30096] Microsoft Windows NAT Helper Components ipnathlp.dll with ICS Malformed DNS Query DoS
8527| [30087] Microsoft IE Empty APPLET Tag DoS
8528| [30022] Microsoft IE Non-breaking Spaces Popup Address Bar Spoofing
8529| [29724] Microsoft Hyperlink Object Library (hlink.dll) Crafted Hyperlink Arbitrary Code Execution
8530| [29720] Microsoft PowerPoint Unspecified Code Execution
8531| [29529] Microsoft Windows 2000 creator.dll ActiveX COM Object Memory Corruption
8532| [29528] Microsoft Windows 2000 msdxm.ocx ActiveX COM Object Memory Corruption
8533| [29527] Microsoft Windows 2000 myinfo.dll ActiveX COM Object Memory Corruption
8534| [29526] Microsoft Windows 2000 ciodm.dll ActiveX COM Object Memory Corruption
8535| [29525] Microsoft IE dxtmsft3.dll Multiple ActiveX COM Object DoS
8536| [29524] Microsoft IE dxtmsft.dll Multiple ActiveX COM Object DoS
8537| [29501] Microsoft Visual Studio Multiple ActiveX COM Object Remote Memory Corruption
8538| [29448] Microsoft PowerPoint Crafted File Unspecified Code Execution
8539| [29447] Microsoft PowerPoint Crafted PPT Data Record Code Execution
8540| [29446] Microsoft PowerPoint Crafted PPT Object Pointer Code Execution
8541| [29445] Microsoft Excel Crafted XLS COLINFO Record Arbitrary Code Execution
8542| [29443] Microsoft Excel Crafted XLS DATETIME Record Arbitrary Code Execution
8543| [29442] Microsoft Word for Mac Crafted String Unspecified Code Execution
8544| [29441] Microsoft Word Crafted Mail Merge File Arbitrary Code Execution
8545| [29440] Microsoft Word memmove Integer Overflow
8546| [29439] Microsoft Windows Server Service Crafted SMB Packet Unspecified Issue
8547| [29431] Microsoft .NET Framework AutoPostBack Property Unspecified XSS
8548| [29430] Microsoft Office Malformed Smart Tag Arbitrary Code Execution
8549| [29429] Microsoft Office mso.dll Malformed Record Handling Arbitrary Code Execution
8550| [29428] Microsoft Office Malformed Chart Record Unspecified Arbitrary Code Execution
8551| [29427] Microsoft Office Crafted String Unspecified Arbitrary Code Execution
8552| [29426] Microsoft XML Core Services XSLT Processing Overflow
8553| [29425] Microsoft XML Core Services XMLHTTP ActiveX Control Server-side Redirect Information Disclosure
8554| [29424] Microsoft Windows Object Packager File Extension Dialog Spoofing
8555| [29412] Microsoft Terminal Server Explorer Error Arbitrary Code Execution
8556| [29351] Microsoft Windows Terminal Services tsuserex.dll COM Object Instantiation
8557| [29347] Microsoft IE msoe.dll COM Object Instantiation Code Execution
8558| [29346] Microsoft IE chtskdic.dll COM Object Instantiation Code Execution
8559| [29345] Microsoft IE imskdic.dll COM Object Instantiation Code Execution
8560| [29259] Microsoft PowerPoint PPT Unspecified Arbitrary Code Execution
8561| [29231] Microsoft Windows Help File Viewer (winhlp32.exe) HLP File Arbitrary Code Execution
8562| [29143] Microsoft PowerPoint PPT Malformed BIFF File Arbitrary Command Execution
8563| [29129] Microsoft IE wininet.dll Content-Type DoS
8564| [29128] Microsoft Windows gdiplus.dll Divide-by-zero DoS
8565| [28946] Microsoft IE Vector Markup Language (VML) Arbitrary Code Execution
8566| [28842] Microsoft IE daxctle.ocx KeyFrame() Method Overflow
8567| [28841] Microsoft IE daxctle.ocx Spline Function Call Overflow
8568| [28731] Microsoft Windows Pragmatic General Multicast (PGM) Multicast Message Arbitrary Code Execution
8569| [28730] Microsoft Publisher PUB File Font Parsing Overflow
8570| [28729] Microsoft Windows Indexing Service Unspecified XSS
8571| [28725] Microsoft Works Malformed Excel Spreadsheet DoS
8572| [28724] Microsoft Works Malformed Excel Spreadsheet Overflow
8573| [28723] Microsoft Works Malformed Works Spreadsheet DoS
8574| [28627] Microsoft IE VBScript and Javascript Infinite Loop Stack Overflow
8575| [28614] Microsoft IE input/div Tag width Conflict DoS
8576| [28539] Microsoft Word 2000 Unspecified Code Execution
8577| [28538] Microsoft Excel Cell Comment Rebuild Arbitrary Code Execution
8578| [28537] Microsoft Excel Crafted SELECTION Record Arbitrary Code Execution
8579| [28536] Microsoft Excel SELECTION Record Memory Corruption Arbitrary Code Execution
8580| [28535] Microsoft Excel Crafted COLINFO Record Arbitrary Code Execution
8581| [28534] Microsoft Excel Crafted LABEL Record Arbitrary Code Execution
8582| [28533] Microsoft Excel Crafted FNGROUPCOUNT Value Arbitrary Code Execution
8583| [28532] Microsoft Excel Crafted BIFF Record Array Index Arbitrary Code Execution
8584| [28381] Microsoft IE ActiveX SaveFile Handling DoS
8585| [28376] Microsoft IE US-ASCII Character Set Filter Bypass XSS
8586| [28372] Microsoft Windows Explorer URL Passing Recursive file Tag Local DoS
8587| [28208] Microsoft Windows Live Messenger Contact List .ctt File Heap Overflow
8588| [27922] Microsoft Virtual DOS Machine (VDM) Local Memory Disclosure
8589| [27855] Microsoft IE document.getElementByID Crafted CSS Arbitrary Code Execution
8590| [27854] Microsoft IE Chained CSS Imports Memory Corruption
8591| [27853] Microsoft IE HTML Rendering Memory Corruption
8592| [27852] Microsoft IE Uninitialized COM Object Memory Corruption
8593| [27851] Microsoft IE Redirect Handling Cross-Domain Privilege Escalation
8594| [27850] Microsoft IE Cross Site Window Location Information Disclosure
8595| [27849] Microsoft Visual Basic Unspecified Document Handling Overflow
8596| [27848] Microsoft Windows Kernel Unspecified Local Privilege Escalation
8597| [27847] Microsoft Windows Unhandled Exception Unspecified Remote Code Execution
8598| [27846] Microsoft Windows Winlogon Search Path Subversion Local Privilege Escalation
8599| [27845] Microsoft Windows Server Service Crafted RPC Message Remote Overflow
8600| [27844] Microsoft Windows DNS Client Service Record Response Overflow
8601| [27843] Microsoft Windows Winsock API Hostname Remote Code Execution
8602| [27842] Microsoft Management Console (MMC) HTML-embedded Resource XSS Arbitrary Command Execution
8603| [27797] Microsoft Windows GDI library (gdi32.dll) createBrushIndirect Function WMF Parsing DoS
8604| [27644] Microsoft Windows Server Driver (srv.sys) Crafted SMB Packet NULL Dereference DoS
8605| [27533] Microsoft IE Orphan Object Property Access NULL Dereference
8606| [27532] Microsoft IE ADODB.Recordset SysFreeString Invalid Length
8607| [27530] Microsoft IE NDFXArtEffects Multiple Property Overflow
8608| [27507] Microsoft Excel Embedded Shockwave Flash Object Arbitrary Javascript Execution
8609| [27475] Microsoft IE Nested Objects Exception Handler Unspecified Memory Corruption
8610| [27373] Microsoft IE Native Function Iteration NULL Dereference
8611| [27372] Microsoft IE Forms Multiple Object ListWidth Property Overflow
8612| [27327] Microsoft PowerPoint PPT File Closure Memory Corruption
8613| [27326] Microsoft PowerPoint powerpnt.exe Unspecified Issue
8614| [27325] Microsoft PowerPoint mso.dll PPT Processing Unspecified Code Execution
8615| [27324] Microsoft PowerPoint mso.dll PPT Processing Arbitrary Code Execution
8616| [27232] Microsoft IE NMSA.ASFSourceMediaDescription dispValue Overflow
8617| [27231] Microsoft IE HTML Help COM Object Click Method NULL Dereference
8618| [27230] Microsoft IE CEnroll SysAllocStringLen Invalid Length
8619| [27155] Microsoft Windows Server Service SRV.SYS Crafted Request SMB Information Disclosure
8620| [27154] Microsoft Windows Server Service SRV.SYS First-class Mailslot Message Remote Overflow
8621| [27153] Microsoft .NET Framework Crafted Request Access Restriction Bypass
8622| [27151] Microsoft Windows DHCP Client Service Crafted Response Overflow
8623| [27150] Microsoft Office MSO.DLL String Processing Overflow
8624| [27149] Microsoft Office Malformed Property Overflow Arbitrary Code Execution
8625| [27148] Microsoft Office File Processing Malformed String Arbitrary Code Execution
8626| [27147] Microsoft Office PNG Processing Unspecified Code Execution
8627| [27146] Microsoft Office GIFIMP32.FLT GIF Parsing Overflow
8628| [27112] Microsoft IE OVCtl NewDefaultItem Method NULL Dereference
8629| [27111] Microsoft IE OWC11.DataSourceControl getDataMemberName Method Overflow
8630| [27110] Microsoft IE WebViewFolderIcon setSlice Overflow
8631| [27109] Microsoft IE DXImageTransform.Microsoft.Gradient Multiple Property Overflow
8632| [27108] Microsoft IE MHTMLFile Multiple Property NULL Dereference
8633| [27059] Microsoft IE FolderItem Object NULL Dereference
8634| [27057] Microsoft IE DXImageTransform.Microsoft.RevealTrans Transition Property NULL Dereference
8635| [27056] Microsoft IE TriEditDocument URL Property NULL Dereference
8636| [27055] Microsoft IE HtmlDlgSafeHelper fonts Property NULL Dereference
8637| [27053] Microsoft Excel Asian Language Style Option Overflow
8638| [27014] Microsoft IE Object.Microsoft.DXTFilter Enabled Property NULL Dereference
8639| [27013] Microsoft IE DirectAnimation.DAUserData Data Property NULL Dereference
8640| [26957] Microsoft IE File Share Traversal Arbitrary HTA Execution
8641| [26956] Microsoft IE object.documentElement.outerHTML Cross-site Information Disclosure
8642| [26955] Microsoft IE RDS.DataControl SysAllocStringLen Invalid Length Issue
8643| [26839] Microsoft IE DirectAnimation.StructuredGraphicsControl SourceURL NULL Dereference
8644| [26837] Microsoft IE Frameset inside Table NULL Dereference
8645| [26836] Microsoft IE OutlookExpress.AddressBook COM Object NULL Dereference
8646| [26835] Microsoft IE HTML Help COM Object Image Property Heap Overflow
8647| [26834] Microsoft IE ADODB.Recordset COM Object Filter Property NULL Dereference
8648| [26666] Microsoft Hyperlink Object Library hlink.dll Link Processing Overflow
8649| [26527] Microsoft Excel Malformed URL String Handling Overflow
8650| [26446] Microsoft IE Multipart HTML File Save Memory Corruption
8651| [26445] Microsoft IE Modal Browser Window Address Bar Spoofing
8652| [26444] Microsoft IE DXImageTransform.Microsoft.Light ActiveX Arbitrary Code Execution
8653| [26443] Microsoft IE UTF-8 Encoded HTML Overflow
8654| [26442] Microsoft IE Wmm2fxa.dll DXImageTransform COM Object Memory Corruption
8655| [26441] Microsoft Exchange Server Outlook Web Access HTML Parsing Unspecified XSS
8656| [26440] Microsoft Windows SMB MrxSmbCscIoctlOpenForCopyChunk Function Overflow
8657| [26439] Microsoft Windows SMB MRXSMB.SYS MrxSmbCscIoctlCloseForCopyChunk Remote DoS
8658| [26438] Microsoft Windows RPC Mutual Authentication Server Spoofing
8659| [26437] Microsoft Windows RRAS RASMAN Remote Overflow
8660| [26436] Microsoft Windows RASMAN RPC Request Remote Overflow
8661| [26435] Microsoft PowerPoint Malformed Record Arbitrary Code Execution
8662| [26434] Microsoft JScript Object Release Memory Corruption
8663| [26433] Microsoft Windows TCP/IP Protocol Driver Source Routing Overflow
8664| [26432] Microsoft Windows jgdw400.dll ART Image Rendering Overflow
8665| [26431] Microsoft Windows Graphics Rendering Engine PolyPolygon Function Overflow
8666| [26430] Microsoft Windows Media Player PNG Processing Overflow
8667| [26193] Microsoft NetMeeting Unspecified Remote DoS
8668| [26175] Microsoft Jet SQL Command Overflow NULL Dereference DoS
8669| [25949] Microsoft Windows INETCOMM.DLL mhtml: URI Overflow
8670| [25761] Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
8671| [25635] Microsoft Word Unspecified Code Execution
8672| [25501] Microsoft Windows itss.dll CHM Processing Overflow
8673| [25338] Microsoft Exchange Collaboration Data Objects Crafted Email Code Execution
8674| [25336] Microsoft Windows Distributed Transaction Coordinator (DTC) BuildContextW Request DoS
8675| [25335] Microsoft Windows Distributed Transaction Coordinator (DTC) CRpcIoManagerServer::BuildContext Function Remote Overflow
8676| [25073] Microsoft IE mhtml: Redirection Domain Restriction Bypass
8677| [25003] Microsoft Office mailto: Arbitrary File Access
8678| [24966] Microsoft IE object Tag Memory Corruption Arbitrary Code Execution
8679| [24802] Microsoft Windows Help winhlp32.exe Embedded Image Processing Overflow
8680| [24595] Microsoft Office Malformed BIFF Record Multiple File Format Processing DoS
8681| [24547] Microsoft IE HTML Parsing Unspecified Remote Code Execution
8682| [24546] Microsoft IE COM Object Instantiation Remote Code Execution
8683| [24545] Microsoft IE HTML Element Crafted Tag Arbitrary Code Execution
8684| [24544] Microsoft IE IOleClientSite Dynamic Object Script Execution
8685| [24543] Microsoft IE Navigation Method Cross-Domain Information Disclosure
8686| [24542] Microsoft IE Unspecified Address Bar Spoofing
8687| [24541] Microsoft IE Double Byte Character Set (DBCS) Parsing Overflow
8688| [24519] Microsoft Outlook Express Windows Address Book (.wab) Processing Overflow
8689| [24518] Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
8690| [24517] Microsoft Data Access Components RDS.Dataspace ActiveX Remote Code Execution
8691| [24516] Microsoft Windows Explorer COM Object Handling Remote Code Execution
8692| [24490] Microsoft IE w/ Sun Java VM INPUT Focus DoS
8693| [24465] Microsoft IE Window Loading Race Condition Address Bar Spoofing
8694| [24318] Microsoft Fingerprint Reader Cleartext Credential Transmission
8695| [24208] Microsoft .NET Framework ILDASM Overflow
8696| [24207] Microsoft .NET Framework ILASM .il File Processing Overflow
8697| [24121] Microsoft Commerce Server 2002 authfiles/login.asp Authentication Bypass
8698| [24095] Microsoft IE Arbitrary HTA File Execution
8699| [24081] Microsoft Outlook 2003 Unspecified Malformed Word Attachment DoS
8700| [24050] Microsoft IE createTextRange() Function Arbitrary Code Execution
8701| [23964] Microsoft IE mshtml.dll Multiple Script Action Handler Overflow
8702| [23903] Microsoft Office Crafted Routing Slip Arbitrary Code Execution
8703| [23902] Microsoft Office Excel Malformed Record Arbitrary Code Execution
8704| [23901] Microsoft Office Excel Malformed Graphic Arbitrary Code Execution
8705| [23900] Microsoft Office Excel Malformed Description Arbitrary Code Execution
8706| [23899] Microsoft Office Excel BIFF File Processing Malformed BOOLERR Record Arbitrary Code Execution
8707| [23711] Microsoft Visual Studio .dbp File DataProject Field Buffer Overflow
8708| [23657] Microsoft IE ActiveX Killbit Setting Bypass
8709| [23609] Microsoft IE Crafted Elements Status Bar URL Spoofing
8710| [23608] Microsoft IE Iframe Folder Delete Weakness
8711| [23591] Microsoft Office Spreadsheet Component SaveAs Capability Arbitrary File Creation
8712| [23588] Microsoft IE Self-referenced OBJECT Directive DoS
8713| [23490] Microsoft IE Scripting Engine Thread Stack Exhaustion DoS
8714| [23484] Microsoft SQLServer 2000 sp_addalias Procedure Privileged Alias Creation
8715| [23307] Microsoft IE window.status Memory Leak DoS
8716| [23234] Microsoft SQLServer 2000 Unspecified Invalid Client Buffer DoS
8717| [23231] Microsoft SQL Server 2000 SQL Profiler Multiple Method DoS
8718| [23228] Microsoft Outlook Web Access .INC File Direct Request Source Disclosure
8719| [23205] Microsoft SQLServer 2000 Crafted Sort Command User Mode Scheduler (UMS) Bypass DoS
8720| [23203] Microsoft SQL Server 2000 Database Name Transact-SQL Statement Privilege Escalation
8721| [23202] Microsoft SQLServer 2000 sysmembers Virtual Table Query Overflow
8722| [23201] Microsoft SQL Server 2000 Dynamic Transact-SQL Statement Disclosure
8723| [23200] Microsoft SQLServer 2000 Encrypted Stored Procedure Dynamic Query Disclosure
8724| [23136] Microsoft Windows/Office Korean Input Method Editor (IME) ShellAbout() Privilege Escalation
8725| [23135] Microsoft PowerPoint Temporary Internet Files Information Disclosure
8726| [23134] Microsoft Windows Web Client Service Crafted WebDAV Request Overflow
8727| [23133] Microsoft Windows IGMPv3 Crafted Packet Remote DoS
8728| [23132] Microsoft Windows Media Player Plug-in Malformed EMBED Element Arbitrary Code Execution
8729| [23131] Microsoft Windows Media Player Bitmap File Processing Overflow
8730| [23047] Microsoft Windows SSDP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
8731| [23046] Microsoft Windows SCardSvr SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
8732| [23045] Microsoft Windows NetBT SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
8733| [23044] Microsoft Windows UPnP SERVICE_CHANGE_CONFIG Permission Weakness Privilege Escalation
8734| [22977] Microsoft IE jscript.dll document.write() NULL Pointer DoS
8735| [22976] Microsoft IE Crafted WMF Header Size Arbitrary Code Execution
8736| [22948] Microsoft IE urlmon.dll BGSOUND Tag file Attribute Overflow DoS
8737| [22941] Microsoft HTML Help Workshop .hhp Parsing Overflow
8738| [22834] Microsoft Log Sink Class pkmcore.dll ActiveX Arbitrary File Manipulation
8739| [22824] Microsoft Excel xls Processing Malformed Page Size Name Null Dereference
8740| [22823] Microsoft Excel xls Processing Malformed Graphic Pointer NULL Pointer Dereference
8741| [22710] Microsoft Windows Ad-hoc Network Advertisement Weakness
8742| [22697] Microsoft Windows Unspecified Display Driver Large Image Processing DoS
8743| [22396] Microsoft Windows WMF Processing ExtEscape POSTSCRIPT_INJECTION Function Overflow DoS
8744| [22371] Microsoft Windows WMF Processing ExtCreateRegion Function Overflow DoS
8745| [22356] Microsoft IE Unspecified NULL Dereference DoS (#2)
8746| [22355] Microsoft IE Unspecified NULL Dereference DoS (#1)
8747| [22354] Microsoft IE Malformed table datasrc Tag DoS
8748| [22351] Microsoft IE Modal Security Dialog Race Condition
8749| [22332] Microsoft Visual Studio UserControl Load Event Code Execution
8750| [22305] Microsoft Outlook/Exchange TNEF Decoding Arbitrary Code Execution
8751| [21987] Microsoft Windows Shimgvw.dll SETABORTPROC Function Crafted WMF Arbitrary Code Execution
8752| [21907] Microsoft Office InfoPath 2003 Mshtml.dll Form Handling DoS
8753| [21763] Microsoft IE Embedded CLSID COM Object Arbitrary Code Execution
8754| [21762] Microsoft IE HTTPS Proxy Basic Authentication URL Cleartext Transmission
8755| [21761] Microsoft IE Keyboard Shortcut Processing Weakness
8756| [21760] Microsoft IE Suppressed Download Dialog Window Manipulation Weakness
8757| [21598] Microsoft Windows 2000 NetBIOS Port Malformed TCP Packet Parsing Remote DoS
8758| [21568] Microsoft Excel xls Processing msvcrt.memmove() Function Malformed Range Overflow
8759| [21562] Microsoft IE CSS Crafted p Element DoS
8760| [21536] Microsoft Windows backup File Name Extension Overflow
8761| [21532] Microsoft IE CSS @import Directive Cross Domain Information Disclosure
8762| [21510] Microsoft Windows SynAttackProtect Bypass
8763| [21471] IISWorks ASPKnowledgeBase kb.asp a Parameter XSS
8764| [20916] Microsoft Windows UPnP GetDeviceList Remote DoS
8765| [20886] Microsoft IE Unspecified Margin/Padding NULL Pointer Dereference DoS
8766| [20875] Microsoft Windows XP Professional Upgrade MSIE Rollback
8767| [20874] Microsoft IE clipboardData Object getData Method Content Disclosure
8768| [20580] Microsoft Windows GetEnhMetaFilePaletteEntries() EMF File Rendering DoS
8769| [20579] Microsoft Windows GDI Metafile SetPalette Entries Overflow
8770| [20500] Microsoft IE Restricted Zone Site Addition URI DoS
8771| [20497] Microsoft Windows 98SE User32.dll Icon DoS
8772| [20376] Microsoft IE with JRE mshtmled.dll Malformed frameset Tag DoS
8773| [20367] Microsoft Windows XP Fast User Switching Arbitrary Account Lockout
8774| [20366] Microsoft Windows XP Remote Desktop Client Cleartext Account Name Transmission
8775| [20364] Microsoft Windows keybd_event Validation Privilege Escalation
8776| [20356] Microsoft Windows Win32k.sys ShowWindow Function Local DoS
8777| [20279] Microsoft Windows ME ssdpsrv.exe Crafted SSDP Message DoS
8778| [20271] Microsoft IE settimeout Function Recursion DoS
8779| [20256] Microsoft Windows 2000 NTFS Volume Macintosh Client Directory Permission Modification
8780| [20248] Microsoft IE Embedded Content Processing XSS
8781| [20241] Microsoft ISA Server Fragmented UDP Saturation DoS
8782| [20222] Microsoft Windows 2000 runas.exe Named Pipe Spoofing Information Disclosure
8783| [20221] Microsoft Windows 2000 runas.exe Named Pipe Single Thread DoS
8784| [20220] Microsoft Windows 2000 runas.exe Cleartext Authentication Information Disclosure
8785| [20217] Macromedia JRun on JWS/IIS Crafted Filename Request Arbitrary JSP Source Disclosure
8786| [20207] Microsoft IE Alphanumeric Password Character Recognition Issue
8787| [20199] Microsoft IE Image Saturation Handling DoS
8788| [20188] Microsoft Windows Crafted SMB SMBnegprots Request DOS
8789| [20151] RSA Authentication Agent for Web IISWebAgentIF.dll Redirect Overflow
8790| [20148] Microsoft Windows smbmount Directory Manipulation Saturation DoS
8791| [20146] Microsoft IE PerfectNav Plugin Malformed URL DoS
8792| [20028] Microsoft Windows XP SP2 TFTP Local Overflow
8793| [20002] Microsoft Windows 2000 CHKDSK Fix Mode File ACL Failure
8794| [20001] Microsoft Windows 2000 Terminal Service Client Connection IP Logging Failure
8795| [20000] Microsoft Windows 2000 Domain Administrator Computer Lock Bypass
8796| [19999] Microsoft Windows 2000 FQDN Domain Login Password Expiry Bypass
8797| [19998] Microsoft Windows 2000 UPN Credentialed Login Group Policy Failure
8798| [19997] Microsoft Windows 2000 WideCharToMultiByte Function String Termination Issue
8799| [19995] Microsoft Windows 2000 SECEDIT Long Folder ACL Set Issue
8800| [19994] Microsoft Windows 2000 audit directory service access 565 Event Logging Failure
8801| [19993] Microsoft Windows 2000 LDAPS CA Trust Issue
8802| [19922] Microsoft Windows Client Service for NetWare (CSNW) Remote Overflow
8803| [19905] Microsoft Collaboration Data Objects Remote Overflow
8804| [19904] Microsoft Windows DTC Packet Relay DoS
8805| [19903] Microsoft Windows DTC Transaction Internet Protocol (TIP) DoS
8806| [19902] Microsoft Windows COM+ Remote Code Execution
8807| [19901] Microsoft Windows FTP Client Arbitrary File Write
8808| [19900] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2122)
8809| [19899] Microsoft Windows Shell Crafted .lnk File Arbitrary Code Execution (2005-2118)
8810| [19898] Microsoft Windows Web View Arbitrary Script Injection
8811| [19876] Microsoft AntiSpyware Registry Extension Bypass
8812| [19873] Microsoft Windows XP Wireless Zero Configuration Credential/Key Disclosure
8813| [19857] Microsoft Windows SeDebugPrivilege NtSystemDebugControl Function Privilege Escalation
8814| [19806] Microsoft IE Crafted Double Backslash shell: URI DoS
8815| [19798] Microsoft IE for Mac Malformed BGSOUND Tag DoS
8816| [19796] Microsoft IE Malformed IFRAME File Source DoS
8817| [19775] Microsoft Windows XP ISAKMP UDP Saturation DoS
8818| [19764] Microsoft Windows XP Malformed explorer.exe.manifest Local DoS
8819| [19662] Microsoft IE XMLHTTP HTTP Request Injection
8820| [19287] Microsoft Windows Firewall Malformed Registry Entry Ruleset Exception Weakness
8821| [19264] Microsoft Exchange Server 2003 Crafted IMAP4 Folder Listing Request DoS
8822| [19187] Microsoft Windows NT/2000 DNS Server Non-delegated NS Glue Record Cache Poisoning
8823| [19185] Microsoft Windows XP Internet Connection Firewall sessmgr.exe Accss Control Bypass
8824| [19093] Microsoft Design Tools msdds.dll COM Object Arbitrary Code Execution
8825| [19089] Microsoft IE Unspecified Remote Code Execution
8826| [19029] Microsoft IE Meta Refresh Parsing Weakness
8827| [19024] Microsoft IE Automatic MIME Detection Weakness
8828| [19007] Microsoft Windows 95 smbclient Triple Dot Traversal Arbitrary Command Execution
8829| [19006] Microsoft Windows NT snmp.exe Malformed OID Packet Saturation DoS
8830| [18956] Microsoft Windows Registry Editor (Regedt32.exe) Long String Obfuscation
8831| [18830] Microsoft Windows UMPNPMGR wsprintfW Remote Overflow
8832| [18829] Microsoft Windows Open Type (EOT) Font Handling Remote Overflow
8833| [18828] Microsoft Windows Distributed Transaction Coordinator (DTC) Memory Modification Remote Code Execution
8834| [18824] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050627)
8835| [18823] Microsoft Windows Kernel APC Queue Manipulation Local Privilege Escalation
8836| [18822] Microsoft DirectX DirectShow QUARTZ.DLL AVI Processing Overflow
8837| [18821] Microsoft Windows Unspecified Remote Code Execution (EEYEB-20050505)
8838| [18820] Microsoft Windows GDI EMF/WMF Metafile Processing Multiple Overflows
8839| [18730] Microsoft Windows XP SP1 Raw IP Empty Datagram DoS
8840| [18729] Microsoft Windows SNMP LAN Manager (LANMAN) MIB Extension GET/NEXT Request DoS
8841| [18728] Microsoft Windows QueryIpMatching Weakness DNS Cache Poisoning
8842| [18681] Microsoft Windows XP User Account Manager Hidden User
8843| [18624] Microsoft Windows Remote Desktop Protocol (RDP) Crafted Packet Remote DoS
8844| [18612] Microsoft IE Multiple COM Object Embedded CLSID Arbitrary Remote Code Execution
8845| [18611] Microsoft IE Web Folder Cross-Domain Code Execution
8846| [18610] Microsoft IE JPEG Rendering Memory Corruption Arbitrary Code Execution
8847| [18609] Microsoft Windows Kerberos PKINIT Domain Controller Spoofing
8848| [18608] Microsoft Windows Kerberos Crafted Packet Remote DoS
8849| [18607] Microsoft Windows Print Spooler Service Remote Overflow
8850| [18606] Microsoft Windows Telephony Application Programming Interface (TAPI) Overflow
8851| [18605] Microsoft Windows Plug-and-Play Service Remote Overflow
8852| [18545] Microsoft Windows NT Cenroll ActiveX (xenroll.dll) File Creation Saturation DoS
8853| [18510] Microsoft IE AJAX Crafted Content-type Header DoS
8854| [18493] Microsoft Windows USB Device Driver Overflow
8855| [18484] Mozilla Firefox with Microsoft Office Shared Section Permission Weakness Information Disclosure
8856| [18461] Microsoft ActiveSync Client/Server Partnership ID Spoofing
8857| [18460] Microsoft ActiveSync Authentication Transmission Cleartext Disclosure
8858| [18459] Microsoft ActiveSync Sync Request Saturation DoS
8859| [18458] Microsoft ActiveSync Device Response Equipment ID Enumeration
8860| [18243] Microsoft Outlook MS-DOS Device Name Attachment DoS
8861| [18241] Microsoft Outlook Express begin Keyword Message Handling DoS
8862| [18152] Microsoft IE Image File Handling Remote DoS
8863| [18008] Hosting Controller IISActions.asp Unlimited Domain Creation
8864| [17901] Hosting Controller IISManagerDB.asp Search Field SQL Injection
8865| [17893] Microsoft ASP.NET RPC/encoded Mode Malformed SOAP Message DoS
8866| [17885] Microsoft Windows Network Connections Service netman.dll Remote DoS
8867| [17860] Microsoft Windows NULL Session MSRPC Interface Remote eventlog Disclosure
8868| [17859] Microsoft Windows NULL Session svcctl MSRPC Interface SCM Service Enumeration
8869| [17830] Microsoft Windows Color Management Module ICC Profile Format Tag Remote Overflow
8870| [17829] Microsoft Office .doc Font Parsing Overflow
8871| [17826] IISWorks ASPWebMail Webmail.mdb Remote User Database Disclosure
8872| [17825] IISWorks ASPKnowledgeBase kb.mdb Remote User Database Disclosure
8873| [17824] IISWorks FileMan fileman.mdb Remote User Database Disclosure
8874| [17823] IISWorks ListPics listpics.mdb Remote User Database Disclosure
8875| [17707] Microsoft Front Page Malformed HTML Edit DoS
8876| [17680] Microsoft IE JVIEW javaprxy.dll Memory Manipulation Arbitrary Code Execution
8877| [17671] Microsoft Site Server viewcode.asp Information Disclosure
8878| [17670] Microsoft Site Server Multiple Sample Sites SQL Injection
8879| [17669] Microsoft Site Server cphost.dll Arbitrary Code Execution
8880| [17668] Microsoft Site Server cphost.dll Malformed File Upload Disk Consumption DoS
8881| [17667] Microsoft Site Server LDAP_Anonymous Account Cleartext Password Disclosure
8882| [17666] Microsoft Site Server formslogin.asp url Parameter XSS
8883| [17665] Microsoft Site Server Default.asp XSS
8884| [17664] Microsoft Site Server remind.asp Information Disclosure
8885| [17663] Microsoft Site Server auoconfig.asp Information Disclosure
8886| [17662] Microsoft Site Server VsPrAuoEd.asp Information Disclosure
8887| [17661] Microsoft Site Server VsLsLpRd.asp Information Disclosure
8888| [17660] Microsoft Site Server VsTmPr.asp Information Disclosure
8889| [17659] Microsoft Site Server vs.asp Information Disclosure
8890| [17658] Microsoft Site Server default.asp Information Disclosure
8891| [17657] Microsoft Site Server UserManager.asp Arbitrary LDAP Modification
8892| [17656] Microsoft Site Server GroupManager.asp Arbitrary LDAP Modification
8893| [17655] Microsoft Site Server DSN.asp Information Disclosure
8894| [17654] Microsoft Site Server driver.asp Information Disclosure
8895| [17653] Microsoft Site Server domain.asp Information Disclosure
8896| [17652] Microsoft Site Server findserver.asp Information Disclosure
8897| [17434] Microsoft Windows ASN.1 BERDecBitString Function Overflow
8898| [17389] Microsoft Outlook Crafted E-mail Subject Arbitrary System File Creation
8899| [17342] Microsoft ISA Server Basic Credentials Exposure
8900| [17334] Microsoft IE Script Code Obfuscation (Ghost)
8901| [17314] Microsoft IE XML Redirect Information Disclosure
8902| [17313] Microsoft IE PNG Image Processing Arbitrary Code Execution
8903| [17312] Microsoft ISA Server NetBIOS Predefined Filter Privilege Escalation
8904| [17311] Microsoft ISA Server Cache Poisoning Restriction Bypass
8905| [17310] Microsoft Agent Trusted Internet Content Spoofing (fireclicking)
8906| [17309] Microsoft Windows Web Client Request Processing Remote Code Execution
8907| [17308] Microsoft Windows Server Message Block (SMB) Remote Code Execution
8908| [17307] Microsoft Exchange Outlook Web Access HTML Email XSS
8909| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
8910| [17305] Microsoft Windows HTML Help (CHM) File Overflow
8911| [17304] Microsoft Windows Interactive Training .cbo File User Field Overflow
8912| [17218] Microsoft IE Stack Overflow Saturation DoS
8913| [17217] Microsoft IE Embedded File Recursion DoS
8914| [17176] Microsoft IE msxml3.dll Malformed Ref href Link DoS
8915| [17159] Microsoft IE Malformed FTP URL DoS
8916| [17158] Microsoft IE Crafted BMP Size Setting DoS
8917| [17131] Microsoft Windows Remote Desktop Protocol (RDP) Private Key Disclosure
8918| [17094] Microsoft IE window() Function Arbitrary Code Execution
8919| [17088] Microsoft AntiSpyware gsasDtServ.exe Path Subversion Privilege Escalation
8920| [17031] Microsoft ISA Server 2000 SecureNAT Traffic Saturation DoS
8921| [16827] Microsoft WGA Multiple Method Validation Bypass
8922| [16814] Microsoft Word mcw File Processing Overflow
8923| [16813] Microsoft ASP.NET FileStream Method Nonexistent File Request Path Disclosure
8924| [16494] Microsoft Windows Media Player WMDRM License Acquisition Page Redirection
8925| [16430] Microsoft Windows Animated Cursor (ANI) Capability AnimationHeaderBlock Length Field Overflow
8926| [16342] Microsoft IE Cross Site Mouse Click Disclosure
8927| [16196] Microsoft ASP.NET __VIEWSTATE Functionality Replay Attack
8928| [16195] Microsoft ASP.NET __VIEWSTATE Functionality Nested Request DoS
8929| [15981] Microsoft Windows XP helpctr.exe Crafted URL Command Execution
8930| [15757] Microsoft SQL Server sa Account Default Null Password
8931| [15739] Microsoft Windows Malformed Image Rendering DoS
8932| [15707] Microsoft Windows Explorer Web View Arbitrary Script Insertion
8933| [15513] RSA Authentication Agent for Web for IIS IISWebAgentIF.dll XSS
8934| [15480] Microsoft Outlook From Header Comma Parsing Failure
8935| [15479] Microsoft XP SP1 explorer.exe Malformed GIF Processing DoS
8936| [15470] Microsoft Word Unspecified Overflow
8937| [15469] Microsoft Windows MSHTA Shell Application Association Arbitrary Remote Script Execution
8938| [15467] Microsoft Exchange Server SMTP Extended Verb X-LINK2STATE Remote Overflow
8939| [15466] Microsoft IE Content Advisor Overflow
8940| [15465] Microsoft IE DHTML Object Memory Corruption Code Execution
8941| [15464] Microsoft IE wininet.dll Long Hostname Heap Corruption Code Execution
8942| [15463] Microsoft Windows IP Validation Failure Remote Code Execution
8943| [15462] Microsoft Windows CSRSS Local Overflow
8944| [15461] Microsoft Windows Object Management Malformed Request DoS
8945| [15460] Microsoft Windows Kernel Access Request Local Privilege Escalation
8946| [15459] Microsoft Windows Font Processing Local Privilege Escalation
8947| [15458] Microsoft Windows Message Queuing Remote Overflow
8948| [15379] Microsoft Windows ActiveDirectory LDAP Authentication Bypass
8949| [15363] Microsoft Windows Explorer.exe Malformed .wmf Processing DoS
8950| [15343] Microsoft Windows Server 2003 Malformed HTTP Cookie Header CGI DoS
8951| [15341] Microsoft Windows Server 2003 SMB Redirector Processing DoS
8952| [15340] Microsoft Windows Server 2003 Terminal Service Client Print DoS
8953| [15339] Microsoft Windows Server Atmf.dll Adobe Font Unloading DoS
8954| [15338] Microsoft Windows Server 2003 Terminal Session Close DoS
8955| [15337] Microsoft Windows Server 2003 CreateProcessWithLogonW() Function Process Disclosure
8956| [15336] Microsoft Windows Server 2003 Shutdown.exe Shut Down Failure
8957| [15335] Microsoft Windows Server 2003 MIT Kerberos Realm Authentication Group Policy Failure
8958| [15334] Microsoft Windows Server 2003 Shared Folder Permission Weakness
8959| [15333] Microsoft Windows Server 2003 EFS File Copy LDAP Connection DoS
8960| [15332] Microsoft Windows Server 2003 Citrix Metaframe Encryption Policy Failure
8961| [15331] Microsoft Windows Server 2003 Home Folder Path Permission Inheritance Failure
8962| [15329] Microsoft IE Malformed RSA Public Key SSL Detection Failure
8963| [15224] Microsoft IE External Caching Security Failure Arbitrary File Access
8964| [15223] Microsoft IE XHTML Formatted Comment User Confirmation Bypass
8965| [15222] Microsoft IE imagetoolbar Functionality Disable Pop Up Dereference DoS
8966| [15221] Microsoft IE Drag and Drop Zone Security Preference Bypass
8967| [15220] Microsoft IE showHelp() Function Cross Domain Code Execution
8968| [15219] Microsoft IE XML Object Arbitrary File Access
8969| [15218] Microsoft IE showHelp() Function Double Backslash Arbitrary .chm Execution
8970| [15217] Microsoft IE input Tag Rendering DoS
8971| [15216] Microsoft IE Dialog Box Cross Domain Arbitrary Program Execution
8972| [15215] Microsoft Windows SMTP E-mail Malformed Time Stamp DoS
8973| [15187] Microsoft Jet Database msjet40.dll File Parsing Overflow
8974| [15171] Microsoft Windows XP Search Function Arbitrary XML Injection
8975| [15110] Microsoft Outlook Connector for Lotus Domino Password Policy Bypass
8976| [15075] Microsoft Windows wab32.dll Malformed .wab File DoS
8977| [15011] Microsoft Windows Remote Desktop TSShutdn.exe Unauthenticated Shutdown DoS
8978| [14882] Microsoft Office InfoPath Manifest.xsf Information Disclosure
8979| [14862] Microsoft Windows GDI32.DLL GetEnhMetaFilePaletteEntries() API EMF File DoS
8980| [14801] Eudora 'Use Microsoft Viewer' Option IE Launch Arbitrary Code Execution
8981| [14793] Microsoft IE window.showHelp() HTML Help File Arbitrary Command Execution
8982| [14741] Microsoft Windows XP CommCtl32.dll Shatter Code Execution
8983| [14663] Microsoft AntiSpyware cscript/wscript Filter Bypass
8984| [14617] Microsoft Exchange Server 2003 Folder Handling DoS
8985| [14578] Microsoft Windows Malformed TCP SYN Loopback Packet Remote DoS (land)
8986| [14509] Microsoft Services for Unix Malformed RPC Client Fragment Packet DoS
8987| [14502] Microsoft Data Access Components RDS Data Stub Remote Overflow
8988| [14497] Microsoft Services for Unix RPC Library Malformed Packet Fragment DoS
8989| [14475] Microsoft Windows Script Engine for Jscript JsArrayFunctionHeapSort Overflow
8990| [14446] Microsoft Virtual Machine Java Applet Invalid Handle DoS
8991| [14445] Microsoft Virtual Machine XML Support Classes Inappropriate Methods
8992| [14430] Microsoft Commerce Server 2000 Profile Service Affected API Overflow
8993| [14399] Microsoft Windows Media Player .wmf Detection Auto-Run Weakness
8994| [14396] Microsoft ISA DNS Intrusion Detection Filter DoS
8995| [14182] Microsoft Windows Drive Restriction Group Policy Bypass
8996| [14118] Microsoft Windows Malformed ARP Packet Saturation DoS
8997| [14025] Microsoft IE Script Initiated Popup Title Bar Spoofing
8998| [13996] Microsoft Windows 2000 IKE Malformed Packet Saturation Remote DoS
8999| [13987] Microsoft Windows XP Help Center helpctr.exe Long hcp: URL Overflow
9000| [13959] Microsoft Windows Universal Plug and Play (UPnP) Malformed Request DoS
9001| [13928] Microsoft ASP.NET HttpServerUtility.HtmlEncode Unicode Character Bypass
9002| [13927] Microsoft ASP.NET Request Validation Mechanism Bypass
9003| [13762] Microsoft 2000 Domain Controller Directory Service Restore Mode Blank Password
9004| [13761] Microsoft Exchange 2000 Malformed URL Request DoS
9005| [13621] Microsoft Outlook Web Access (OWA) owalogon.asp Redirection Account Enumeration
9006| [13609] Microsoft Windows Hyperlink Object Library Overflow
9007| [13608] Microsoft IE Drag-and-Drop Privilege Escalation
9008| [13607] Microsoft IE CDF Cross-Domain Code Execution
9009| [13606] Microsoft IE createControlRange() Function Heap Corruption
9010| [13605] Microsoft IE URL Decoding Zone Spoofing Code Execution
9011| [13604] Microsoft IE Drag-and-Drop File Injection
9012| [13602] Microsoft Windows OLE Input Validation Overflow
9013| [13601] Microsoft Windows COM Structured Storage Privilege Escalation
9014| [13600] Microsoft Windows SMB Transaction Data Overflow
9015| [13599] Microsoft Windows License Logging Service Overflow
9016| [13597] Microsoft Windows Media Player PNG File Overflow
9017| [13596] Microsoft Windows XP Named Pipe Username Disclosure
9018| [13595] Microsoft Windows Sharepoint Services HTML Redirection XSS
9019| [13594] Microsoft Office XP URL Overflow
9020| [13577] Microsoft Windows NetBIOS Remote Host Information Disclosure
9021| [13510] Microsoft Index Server AllowedPaths Registry Key Index Path Disclosure
9022| [13483] Microsoft Site Server AdSamples SITE.CSC Information Disclosure
9023| [13482] Microsoft Network Monitor (Netmon) Protocol Parsing Remote Overflow
9024| [13481] Microsoft Windows NT OffloadModExpo CryptographyOffload Registry Key Permission Weakness
9025| [13480] Microsoft Windows NT MTS Package Administration Registry Key Permission Weakness
9026| [13478] Microsoft MS01-014 / MS01-016 Patch Memory Leak DoS
9027| [13477] Microsoft Windows Java Applet UDP Socket Exhaustion DoS
9028| [13476] Microsoft Windows Media Player asx Parser Multiple Tag Overflow
9029| [13475] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution Variant
9030| [13474] Microsoft Windows 2000 Telnet Service Predictable Named Pipe Arbitrary Command Execution
9031| [13472] Microsoft Services for Unix Telnet Service Memory Consumption DoS
9032| [13471] Microsoft Services for Unix NFS Service Memory Consumption DoS
9033| [13441] Microsoft Windows 2000 Security Interface Change Password Option Account Enumeration
9034| [13440] Microsoft Windows XP Hot Keys Screen Lock Bypass
9035| [13438] Microsoft Windows CONVERT.EXE FAT32 File Permission Conversion Failure
9036| [13437] Microsoft Windows 2000 Debug Register Local Privilege Escalation
9037| [13436] Microsoft Exchange LDAP Filter Exceptional BER Encoding DoS
9038| [13435] Microsoft Windows XP Port 445 Malformed SYN Packet DoS
9039| [13434] Microsoft Windows Distributed Transaction Coordinator (DTC) Malformed Input DoS
9040| [13425] Microsoft .NET orderdetails.aspx OrderID Parameter Arbitrary Order Access
9041| [13424] Microsoft Windows 2000 Current Password Change Policy Bypass
9042| [13423] Microsoft Windows 2000 Terminal Server SYSVOL Share Connection Saturation Restriction Bypass
9043| [13422] Microsoft Windows PPTP Service Malformed Control Data Overflow
9044| [13421] Microsoft Windows XP RDP Malformed PDU Confirm Active Packet DoS
9045| [13420] Microsoft Windows NTFS Hard Link Audit Bypass
9046| [13419] Microsoft Windows Media Player Active Playlist Arbitrary HTML Script Execution
9047| [13418] Microsoft Virtual Machine Applet Tag Malformed CODEBASE Arbitrary File Access
9048| [13417] Microsoft Virtual Machine COM Object Arbitrary Code Execution
9049| [13416] Microsoft Windows NetDDE Agent WM_COPYDATA Message Arbitrary Code Execution (shatter)
9050| [13415] Microsoft Windows 2000 System Root Folder Search Path Permission Weakness
9051| [13414] Microsoft Windows RPC Endpoint Manager Malformed Packet Remote DoS
9052| [13413] Microsoft Windows XP Windows Shell Function .mp3/.wma Custom Attribute Overflow
9053| [13412] Microsoft Virtual Machine user.dir Property Information Disclosure
9054| [13411] Microsoft Windows XP Redirector Function Long Parameter Overflow
9055| [13410] Microsoft Windows 2000 Accessibility Utility Manager Arbitrary Code Execution
9056| [13409] Microsoft Windows XP EXPLORER.EXE desktop.ini .ShellClassInfo Parameter Overflow
9057| [13408] Microsoft Windows SHELL32.DLL ShellExecute API Function Overflow
9058| [13406] Microsoft BizTalk Server BizTalkHTTPReceive.dll ISAPI Overflow
9059| [13389] Microsoft Windows DirectX QUARTZ.DLL Multiple Field .mid File Overflows
9060| [13333] Mozilla Thunderbird Microsoft IE Default Javascript Handler
9061| [13330] Microsoft Windows HKLM Registry Key Locking DoS
9062| [13325] Microsoft Network Monitor (Netmon) HTTP Protocol Parser Overflow
9063| [13308] RSA SecurID WebID sdiis.dll Direct Request DoS
9064| [13258] Microsoft IE Excel File Address Bar Spoofing
9065| [13238] Microsoft PowerPoint Action Settings Allows Invocation of Default Browser
9066| [13133] Microsoft IE iframe Tag Malformed file Attribute DoS
9067| [13132] Microsoft IE %20 URL Spoofing
9068| [13040] Microsoft IE Javascript Load Local File Path Disclosure
9069| [13020] Microsoft Windows XP RPC Cache Memory Leak
9070| [12937] Microsoft Office Encrypted Document RC4 Implementation Weakness
9071| [12918] Microsoft IE Dynamic IFRAME Tag XP SP2 File Download Security Bypass
9072| [12862] Microsoft IE USER32.CharLowerA Exception DoS
9073| [12842] Microsoft Windows Cursor and Icon Validation Code Execution
9074| [12840] Microsoft Windows HTML Help Related Topics Arbitrary Command Execution
9075| [12832] Microsoft Windows Indexing Service Query Overflow
9076| [12806] Microsoft DATA Access IPS DAV Component Remote Arbitrary Content Write
9077| [12709] Microsoft HTML Parser Malformed Javascript DoS
9078| [12698] Microsoft IE FTP Download Traversal Arbitrary Command Execution
9079| [12660] Microsoft IE with RealOne pnxr3260.dll Embed Tag Arbitrary Code Execution
9080| [12655] Microsoft Windows Active Directory LSASS.EXE DoS
9081| [12652] Microsoft Visual Basic for Applications (VBA) VBE.DLL and VBE6.DLL Long ID Overflow
9082| [12625] Microsoft Windows winhlp32.exe Overflow
9083| [12624] Microsoft Windows Kernel ANI File Parsing DoS
9084| [12623] Microsoft Windows LoadImage API Overflow
9085| [12511] Microsoft Windows Media Player ActiveX Control setItemInfo() / getItemInfo() Arbitrary WMA File Manipulation
9086| [12510] Microsoft Windows Media Player ActiveX Control getItemInfoByAtom() Function File Information Disclosure
9087| [12507] Microsoft Windows XP SP2 Popup Blocker Bypass
9088| [12482] Microsoft Windows XP Dial-Up Access Firewall Disable
9089| [12424] Microsoft IE DHTML Edit ActiveX Control execScript() XSS
9090| [12408] Cisco Unity With Microsoft Exchange Multiple Default Accounts
9091| [12378] Microsoft Windows WINS Association Context Validation Remote Code Execution
9092| [12377] Microsoft Windows NT DHCP Message Length Remote Overflow
9093| [12376] Microsoft Windows LSASS Identity Token Validation Local Privilege Escalation
9094| [12375] Microsoft Word / Wordpad Font Converter Remote Overflow
9095| [12374] Microsoft Windows HyperTerminal Session File Remote Overflow
9096| [12373] Microsoft Word / Wordpad Tables Converter Remote Overflow
9097| [12372] Microsoft Windows Kernel Application Launch Local Privilege Escalation
9098| [12371] Microsoft Windows NT Malformed DHCP Packet Remote Overflow DoS
9099| [12370] Microsoft Windows WINS Computer Name Validation Remote Code Execution
9100| [12342] Microsoft IE BASE/FORM Address Bar Spoofing
9101| [12313] Microsoft IE Cross-domain Browser Window Injection Content Spoofing
9102| [12300] Microsoft SharePoint Portal Server STSADM.log-* Log Local User Credential Disclosure
9103| [12299] Microsoft IE FTP URL Arbitrary Command Injection
9104| [12277] Microsoft IE sysimage: Local File Existence Disclosure
9105| [12258] Microsoft W3Who ISAPI (w3who.dll) Query String Remote Overflow
9106| [12257] Microsoft W3Who ISAPI (w3who.dll) Error Message XSS
9107| [12256] Microsoft W3Who ISAPI (w3who.dll) HTTP Connection Header XSS
9108| [12163] Microsoft IE Save Picture As File Extension Spoofing
9109| [12123] Microsoft Windows ipconfig.exe Overflow
9110| [12001] Microsoft Windows XP SP2 File Download Warning Bypass
9111| [12000] Microsoft Windows XP SP2 Unspecified Local Zone Access
9112| [11999] Microsoft Windows XP SP2 Unspecified Remote File Access
9113| [11958] Microsoft Outlook 2003 Image Rendering Security Policy Bypass
9114| [11957] Microsoft Outlook Express Troubleshooting Feature SMTP Auth Credential Disclosure
9115| [11956] Microsoft Outlook/Express Message body NUL Character DoS
9116| [11955] Microsoft IE/Outlook URL FORM Status Bar Spoofing
9117| [11954] Microsoft Outlook Express .dbx Deleted E-mail Persistence
9118| [11953] Microsoft Outlook Express A HREF Link Overflow DoS
9119| [11952] Microsoft Outlook Express S/MIME CA Certificate Spoofing
9120| [11951] Microsoft IE/Outlook XML File Attachment Arbitrary Script Execution
9121| [11950] Microsoft Outlook Express MIME Header Manipulation File Extension Spoofing Weakness
9122| [11949] Microsoft IE/Outlook BGSOUND Tag Information Disclosure
9123| [11948] Microsoft IE/Outlook Express IFRAME Tag Parsing Remote DoS
9124| [11947] Microsoft IE/Outlook BGSOUND Tag Parsing Remote DoS
9125| [11946] Microsoft IE/Outlook Malformed XBM File DoS
9126| [11945] Microsoft Outlook 2002 IFRAME Tag Embedded URL
9127| [11944] Microsoft Outlook 2002 HREF Tag Embedded JavaScript Execution
9128| [11943] Microsoft Outlook Image Tag Cookie Setting Bypass
9129| [11942] Microsoft Outlook Express Email Forward Blocked Attachment Access
9130| [11941] Microsoft Outlook Express HTML Frame base64 Attachment Security Bypass
9131| [11940] Microsoft Outlook Blocked Attachment Access
9132| [11939] Microsoft Outlook Attachment Spoofed Content Type
9133| [11938] Microsoft Outlook Express Attachment Filename Overflow
9134| [11937] Microsoft Outlook 98 Hidden Drive Access
9135| [11936] Microsoft Windows shlwapi.dll Malformed HTML Tag Handling Null Pointer DoS
9136| [11935] Microsoft Multiple Mail Client Read/Delivery Receipt Tag DoS
9137| [11918] Microsoft IE execCommand() File Extension Spoofing
9138| [11917] Microsoft Windows XP SP2 Spoofed Content-Location Warning Bypass
9139| [11914] Microsoft Virtual Machine JDBC API Remote Security Check Bypass
9140| [11912] Microsoft Virtual Machine JDBC Java Applet Arbitrary DLL Load
9141| [11878] Microsoft IE Crafted Path Arbitrary Cookie Overwrite
9142| [11801] Microsoft Windows Small Buffer Length SMB Packet Overflow
9143| [11799] Microsoft Windows SMB Signing Group Policy Modification
9144| [11797] Microsoft Windows DCOM RPCSS Service DCERPC Packet Overflow
9145| [11750] Microsoft Windows 2000 Message Queue Manager Queue Registration Request Overflow DoS
9146| [11742] Microsoft IE Multiple Slash Disabled Protocol/Resource Restriction Bypass
9147| [11712] Microsoft ISA Server 2000 H.323 Filter Overflow
9148| [11580] Microsoft IE res: URI Handler File Existence Disclosure
9149| [11479] Microsoft Windows NT Double Dot Samba Client DoS
9150| [11478] Microsoft Windows NT Malformed SMB Logon Request DoS
9151| [11477] Microsoft Windows NT LSASS.EXE Access Violation DoS
9152| [11476] Microsoft Windows NT DebugActiveProcess Function Privilege Escalation
9153| [11475] Microsoft Windows NT NtOpenProcessToken Permission Failure
9154| [11474] Microsoft Windows NT CSRSS Thread Exhaustion DoS
9155| [11473] Microsoft Windows NT Messenger Service Long Username DoS
9156| [11472] Microsoft Windows NT DNS Server Malformed Response DoS
9157| [11471] Microsoft Windows NT DNS Server Character Saturation DoS
9158| [11470] Microsoft Windows NT Help File Utility Overflow
9159| [11469] Microsoft Windows NT Malformed File Image Header DoS
9160| [11468] Microsoft Windows NT IOCTL Function DoS
9161| [11463] Microsoft Windows Authenticode ActiveX Install Failure Remote Code Execution
9162| [11462] Microsoft Windows HSC PCHealth System HCP URL Query Overflow
9163| [11461] Microsoft Windows Workstation Service WKSSVC.DLL Logging Function Remote Overflow
9164| [11460] Microsoft Windows RPC DCOM Interface epmapper Pipe Hijack Local Privilege Escalation
9165| [11453] Microsoft Windows 98 Malformed oshare Packet DoS
9166| [11424] Microsoft Outlook V1 Exchange Server Security Certificate Cleartext Transmission
9167| [11423] Microsoft Outlook Malformed Header DoS
9168| [11422] Microsoft Outlook Express S/MIME Parsing Routine Remote Overflow
9169| [11420] Microsoft Outlook WMP .wms File IFRAME Command Execution
9170| [11419] Microsoft Outlook Express Header Carriage Return Filter Bypass
9171| [11418] Microsoft Outlook Express text/plain MIME Content Embedded SCRIPT Tag Command Execution
9172| [11417] Microsoft Outlook/Express VCard Handler Remote Overflow
9173| [11416] Microsoft Outlook/Express Blank Header DoS
9174| [11415] Microsoft Outlook Express Forced POP3 Command Mode DoS
9175| [11395] F-Secure Anti-Virus for Microsoft Exchange Nested Password Protected Archives Bypass
9176| [11337] Microsoft IE FRAME/IFRAME/EMBED Tag Overflow
9177| [11274] Microsoft IE "
9178| [11268] Microsoft Exchange Internet Mail Service AUTH/AUTHINFO Command DoS
9179| [11265] Microsoft Windows NT Malformed RPC Packet Error Message Loop DoS (snork)
9180| [11264] Microsoft Windows NT SCM Malformed Resource Enumeration Request DoS
9181| [11259] Microsoft Windows NT Domain User Login System Policy Download Failure
9182| [11222] Microsoft XP SP2 Authenticated User Remote Shutdown
9183| [11170] Microsoft IE iframe Malformed base href DoS
9184| [11162] Microsoft Windows 95 .pwl File Weak Password Encryption
9185| [11161] Microsoft Windows 95 NetWare Remote Administration Hidden File Share
9186| [11159] Microsoft Windows NT Invalid RPC Named Pipe Saturation DoS
9187| [11158] Microsoft Windows NT Malformed Token Ring DoS
9188| [11156] Microsoft Windows NT tcpip.sys Malformed ICMP Request DoS
9189| [11152] Microsoft IE Malformed HTML Style DoS
9190| [11138] Microsoft IE HTML Rendering mshtml.dll NULL Pointer Dereference DoS
9191| [11096] Microsoft Windows ntconfig.pol Write Failure Access Restriction Bypass
9192| [11095] Microsoft Windows NT Ntconfig.pol Long Server Name Access Restriction Bypass
9193| [11094] Microsoft Windows NT User Mode Application Handle Closing DoS
9194| [11063] Microsoft Site Server Direct Mailer TMLBQueue Share Information Disclosure
9195| [11053] Microsoft Windows XP Explorer WAV Parsing DoS
9196| [11051] Microsoft Outlook cid: MIME Mishandling Forced Image Rendering
9197| [11018] Microsoft SNA Server AS/400 Local APPC LU Shared Folder Disclosure
9198| [11011] Microsoft Windows NT Netbt.sys Malformed DNS Response DoS
9199| [10999] Microsoft Windows Troubleshooter ActiveX Control Tshoot.ocx Arbitrary Code Execution
9200| [10998] Microsoft Access Snapshot Viewer ActiveX Control Arbitrary Command Execution
9201| [10997] Microsoft Windows Media Player ActiveX Control Unauthorized Media Library Manipulation
9202| [10996] Microsoft File Transfer Manager ActiveX Control Arbitrary Command Execution
9203| [10995] Microsoft File Transfer Manager ActiveX Control Arbitrary File Upload/Download
9204| [10994] Microsoft DirectX Files Viewer ActiveX Control xweb.ocx Overflow
9205| [10992] Microsoft IE Embedded HTML Help Control Cross Zone Scripting
9206| [10991] Microsoft IE HTML Help Drag and Drop Arbitrary Code Injection
9207| [10977] Microsoft Eyedog ActiveX Server Side Redirect Arbitrary Command Execution
9208| [10975] Microsoft Windows NT Winpopup Long Username DoS
9209| [10967] Microsoft IE Javascript User Homepage Address Spoofing
9210| [10938] Microsoft Windows User32.dll ComboBox CB_DIR Message Local Overflow
9211| [10937] Microsoft Windows User32.dll ListBox LB_DIR Message Local Overflow
9212| [10936] Microsoft Windows Messenger Service Message Length Remote Overflow
9213| [10935] Microsoft Word Macro Security Model Bypass
9214| [10908] Microsoft Windows XP SP2 ZIP Wizard ZoneID Tracking Failure
9215| [10895] Microsoft FrontPage asycpict.dll JPEG Processing DoS
9216| [10854] Microsoft Windows XP Zip Manager zipfldr.dll Overflow DoS
9217| [10756] Microsoft MSN heartbeat.ocx Component Overflow
9218| [10736] Microsoft Excel SYLK Macro Arbitrary Command Execution
9219| [10735] Microsoft Excel Virus Warning Mechanism Bypass
9220| [10734] Microsoft Word/Excel Shared Document INCLUDEPICTURE Field Arbitrary File Read
9221| [10733] Microsoft Word/Excel Shared Document INCLUDETEXT Field Arbitrary File Read
9222| [10714] Microsoft cabarc Traversal Arbitrary File Overwrite
9223| [10709] Microsoft IE SSL Cached Content Spoofing
9224| [10708] Microsoft IE Image Tag Arbitrary Script Execution (HijackClick 3)
9225| [10707] Microsoft IE Plug-in Navigation Address Bar Spoofing
9226| [10706] Microsoft IE Double Byte Character Set Address Bar Spoofing
9227| [10705] Microsoft IE Install Engine Inseng.dll Arbitrary Code Execution
9228| [10704] Microsoft IE Similar Method Name Redirection Cross Domain/Site Scripting
9229| [10699] Microsoft Windows Program Group Converter Arbitrary Code Execution
9230| [10698] Microsoft Windows Shell Application Start Arbitrary Code Execution
9231| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
9232| [10696] Microsoft Windows/Exchange SMTP DNS Lookup Overflow
9233| [10695] Microsoft Windows Compressed Folders DUNZIP32.DLL File Handling Overflow
9234| [10694] Microsoft Excel XLS File Local Overflow (MS04-033)
9235| [10693] Microsoft Windows Unspecified Kernel Local DoS
9236| [10692] Microsoft Windows Metafile Image Format Arbitrary Code Execution
9237| [10691] Microsoft Windows Virtual DOS Machine Subsystem Local Privilege Escalation
9238| [10690] Microsoft Windows Management APIs Local Privilege Escalation
9239| [10689] Microsoft Windows NetDDE Remote Overflow
9240| [10688] Microsoft Windows WebDAV XML Message Handler Malformed Request DoS
9241| [10686] Microsoft Windows NT RPC Library Arbitrary Memory Manipulation
9242| [10670] Microsoft ASP.NET Forms .aspx File Authentication Bypass
9243| [10648] Microsoft Windows NT Default SNMP Registry Key Permission Weakness Local Privilege Escalation
9244| [10647] Microsoft Windows CIFS Browser Protocol Arbitrary NetBIOS Cache Entry Modification
9245| [10634] Microsoft Windows 95/98 Spoofed ARP Packet Cache Manipulation
9246| [10633] Microsoft Windows 2000 Protected Store Weak Encryption Default
9247| [10618] Microsoft Windows NT autorun.inf Arbitrary Command Execution
9248| [10616] Microsoft Windows NT Fragmented IP Packet Firewall Restriction Bypass
9249| [10615] Microsoft Windows NT linux smbmount Request DoS
9250| [10614] Microsoft Windows NT %systemroot% Path Inclusion
9251| [10609] Microsoft Windows WINS Malformed Packet Consumption DoS
9252| [10608] Microsoft Windows TCP/IP Last Sequence Forced RST DoS
9253| [10607] Microsoft Windows ICMP Redirect Spoofing DoS
9254| [10606] Microsoft Windows LSA NULL Policy Handle DoS
9255| [10604] Microsoft Windows NT PATH Working Directory Inclusion
9256| [10557] Microsoft ASP.NET Canonicalization Authentication Bypass
9257| [10550] Microsoft IE Redirect Script Arbitrary XML Document Access
9258| [10549] Microsoft Word .doc Parsing Exception Arbitrary Command Execution
9259| [10456] Microsoft Windows IPv6 Packet Fragmentation Handling DoS
9260| [10379] Microsoft SQL Server Large Query DoS
9261| [10358] Microsoft Outlook Client Persistent X-UIDL Header DoS
9262| [10247] Microsoft Windows SMTP Service NTLM Null Session Mail Relay
9263| [10246] Microsoft Exchange Server Malformed NNTP AUTHINFO DoS
9264| [10240] Macromedia Multiple Products on IIS Crafted URL Application Source Disclosure
9265| [10230] Microsoft Windows XP SP2 File/Print Share Restriction Bypass
9266| [10183] Microsoft SQL Server xp_sprintf Function DoS
9267| [10181] Microsoft SQL Server formatmessage Function DoS
9268| [10166] Microsoft SQL Server raiserror Function DoS
9269| [10159] Microsoft SQL Server Multiple Extended Stored Procedure Overflows
9270| [10158] Microsoft SQL Server Password Encryption Procedure Overflow
9271| [10157] Microsoft SQL Server BULK INSERT Query Overflow
9272| [10156] Microsoft SQL Server SQLExecutiveCmdExec Account Credential Encryption Weakness
9273| [10155] Microsoft SQL Server Enterprise Manager Authentication Credential Encryption Weakness
9274| [10154] Microsoft SQL Server xp_SetSQLSecurity Function Overflow
9275| [10153] Microsoft SQL Server xp_proxiedmetadata Function Overflow
9276| [10152] Microsoft SQL Server xp_printstatements Function Overflow
9277| [10151] Microsoft SQL Server xp_peekqueue Function Remote Overflow
9278| [10150] Microsoft SQL Server xp_updatecolvbm Function Overflow
9279| [10149] Microsoft SQL Server xp_showcolv Function Remote Overflow
9280| [10148] Microsoft SQL Server xp_enumresultset Function Overflow
9281| [10147] Microsoft SQL Server xp_displayparamstmt Function Overflow
9282| [10146] Microsoft SQL Server xp_sprintf Function Overflow
9283| [10145] Microsoft SQL Server formatmessage Function Overflow
9284| [10144] Microsoft SQL Server raiserror Function Overflow
9285| [10143] Microsoft SQL Server OpenRowset OLE DB Provider Name Overflow
9286| [10142] Microsoft SQL Server OpenDataSource OLE DB Provider Name Overflow
9287| [10141] Microsoft SQL Server sestup.iss File Authentication Credential Disclosure
9288| [10140] Microsoft SQL Server Stored Procedure Arbitrary Command Execution
9289| [10139] Microsoft SQL Server Agent Arbitrary File Creation
9290| [10138] Microsoft SQL Server xp_displayparamstmt Procedure Privilege Escalation
9291| [10137] Microsoft SQL Server xp_printstatements Procedure Privilege Escalation
9292| [10136] Microsoft SQL Server xp_execresultset Procedure Privilege Escalation
9293| [10135] Microsoft SQL Server Malformed 0x08 Packet DoS
9294| [10133] Microsoft SQL Server sp_MScopyscript Procedure scriptfile Parameter Arbitrary Code Execution
9295| [10132] Microsoft SQL Server Authentication Function Remote Overflow
9296| [10131] Microsoft SQL Server DBCC SourceDB Argument Arbitrary Command Execution
9297| [10129] Microsoft Data Access Components SQL-DMO Broadcast Request Overflow
9298| [10127] Microsoft SQL Server xp_runwebtask Procedure Privilege Escalation
9299| [10126] Microsoft SQL Server CreateFile API Function Privilege Escalation
9300| [10125] Microsoft SQL Server Named Pipe Hijack Privilege Escalation
9301| [10123] Microsoft SQL Server LPC Packet Handling Local Overflow
9302| [10104] Microsoft BizTalk Server DTA RawCustomSearchField.asp SQL Injection
9303| [10103] Microsoft BizTalk Server DTA rawdocdata.asp SQL Injection
9304| [10006] Microsoft WordPerfect Converter Corel File Multiple Parameter Remote Overflow
9305| [9951] Microsoft Multiple Products GDIPlus.dll JPEG Processing Overflow
9306| [9896] Microsoft Netmeeting Remote Desktop Sharing Remote Session Hijack
9307| [9895] Microsoft NetMeeting Arbitrary Clipboard Content Disclosure
9308| [9818] F-Secure Anti-Virus For Microsoft Exchange Content Scanner Server Exception Handling DoS
9309| [9722] Microsoft Windows NT System Critical Registry Key Contain Bad Value
9310| [9671] Microsoft IE onUnload Address Bar Spoofing
9311| [9579] Microsoft Windows NT GetThreadContext/SetThreadContext Kernel Mode Address DoS
9312| [9560] HP Systems Insight Manager Microsoft Security Patch Login DoS
9313| [9530] Microsoft Windows CRL File Digital Signature Verification Failure
9314| [9386] Microsoft Windows 2000 msinfo32.exe msinfo_file Variable Overflow
9315| [9359] Microsoft Windows Page File pagefile.sys Information Disclosure
9316| [9358] Microsoft Windows NT Event Log Inappropriate Permissions
9317| [9356] Microsoft Windows NT HKEY_CLASSES_ROOT Key Inappropriate System-Critical Permissions
9318| [9355] Microsoft Windows NT HKEY_LOCAL_MACHINE Key Inappropriate System-Critical Permissions
9319| [9349] Microsoft Windows NT Systems User Audit Policy Logging Weakness
9320| [9348] Microsoft Windows NT Non-NTFS File System Insecure
9321| [9207] Microsoft Content Management ManualLogin.asp REASONTXT Parameter XSS
9322| [9189] Microsoft ASP.Net Null Character XSS Protection Bypass
9323| [9172] Microsoft IE File/Directory Existence Disclosure
9324| [9167] Microsoft Outlook Express BCC: Recipient Information Disclosure
9325| [9152] Microsoft Windows XP SP2 Zone Identifier Object Value Warning Failure
9326| [9141] Microsoft Windows File Icon Spoofing
9327| [9140] Microsoft Windows XP Content-Location Local Computer Zone Bypass
9328| [9070] Microsoft IE dragDrop Arbitrary File Upload (What a Drag II)
9329| [9012] Microsoft Windows XP Internet Connection Firewall Bypass
9330| [8978] Microsoft IE Address Bar Spoofing (NullyFake)
9331| [8941] Microsoft IE Merlin.speak Function CPU DoS
9332| [8706] Solaris mibiisa MIB Parsing Remote Overflow
9333| [8428] Microsoft NetMeeting Malformed Packets DoS
9334| [8414] Microsoft IE mms: Protocol Handler Arbitrary Command
9335| [8368] Microsoft Windows XP/2003 Login Screen Consumption DoS
9336| [8335] Microsoft IE mshtml.dll Null Pointer DoS
9337| [8334] Microsoft Windows NT \?? Object Folder Symlink Privilege Escalation
9338| [8277] Microsoft IE Malformed GIF Double-free DoS
9339| [8276] Microsoft IE Malformed BMP Overflow
9340| [8275] Microsoft IE Navigation Cross Domain Execution (InsiderPrototype)
9341| [8243] Microsoft SMS Port 2702 DoS
9342| [8224] Microsoft IE CSS Memory Corruption DoS
9343| [8211] Microsoft Exchange Server Malformed SMTP Command DoS
9344| [8210] Microsoft HTML Control Large Form Field DoS
9345| [8161] Microsoft Windows NT Invalid User Privileges
9346| [8160] Microsoft Windows NT File/Directory Invalid Permissions
9347| [8148] Microsoft IE Arbitrary File Write (What a Drag)
9348| [8129] Microsoft IE CSS Malformed div element DoS
9349| [8112] Microsoft Windows NT Weak Account Password Policy
9350| [8053] Microsoft Virtual Machine Illegal Cast Operation Command Execution
9351| [8052] Microsoft ActiveX Control Arbitrary Cabinet File Execution
9352| [8051] Microsoft Windows Networking Software Long Filename Handling Arbitrary Command Execution
9353| [7963] Microsoft IE parent.window.open location.cache Script Execution
9354| [7951] Microsoft SMS Remote Control Client DoS
9355| [7916] Microsoft IE Multimedia Page XSS (viaSWFurl)
9356| [7915] Microsoft IE ADODB.Stream Media Arbitrary File Execution
9357| [7914] Microsoft IE .FOLDER File Type Execution
9358| [7913] Microsoft IE Shell.Application ActiveX Arbitrary Command Execution
9359| [7912] Microsoft IE showHelp() Arbitrary File Execution
9360| [7910] Microsoft IE Double Slash Cache File Execution (DblSlashForCache)
9361| [7909] Microsoft IE Cache Location Information Disclosure (execdror6)
9362| [7907] Microsoft IE FileSystemObject ActiveX Object Arbitrary Command Execution
9363| [7906] Microsoft IE WebBrowser ActiveX Object Clipboard Content Disclosure
9364| [7905] Microsoft IE ie5setup.exe Multple Service Disable
9365| [7904] Microsoft Windows Media Player ActiveX File Existence Disclosure
9366| [7903] Microsoft IE external.NavigateAndFind Arbitrary File Access
9367| [7902] Microsoft IE / Outlook Express Active Scripting Arbitrary E-mail Message Access
9368| [7901] Microsoft IE Active Setup ActiveX Component Arbitrary Software Installation
9369| [7900] Microsoft IE WebBrowser Control NavigateComplete2 Policy Bypass
9370| [7899] Microsoft IE with ActivePython ActiveX Control Arbitrary File Read
9371| [7898] Microsoft IE with Google Toolbar Malicious HTML DoS
9372| [7897] Microsoft IE Crafted Filename Arbitrary Visual FoxPro Application Execution
9373| [7896] Microsoft IE Java Implementation Malformed Domain Portion Arbitrary Script Execution
9374| [7895] Microsoft IE MS-DOS Device Name URL DoS
9375| [7894] Microsoft IE Object Tag Type Property Double-byte Overflow
9376| [7893] Microsoft IE window.open file: Security Bypass (WsOpenFileJPU)
9377| [7892] Microsoft IE href Javascript Arbitrary Command Execution (BodyRefreshLoadsJPU)
9378| [7891] Microsoft Windows IE window.moveBy Function Pointer Hijack (HijackClickV2)
9379| [7890] Microsoft IE Download Function Cache Disclosure (threadid10008)
9380| [7889] Microsoft IE createTextRange Security Bypass (LinKiller)
9381| [7888] Microsoft IE createRange FIND Dialog Security Bypass (Findeath)
9382| [7887] Microsoft IE XML Data Binding Object Tag Arbitrary Command Execution
9383| [7886] Microsoft Java Virtual Machine StandardSecurityManager Restriction Bypass
9384| [7885] Microsoft Java Implementation Applet Tag DoS
9385| [7884] Microsoft Java Virtual Machine Passed HTML Object DoS
9386| [7883] Microsoft Java Implementation CabCracker Class Security Bypass
9387| [7882] Microsoft Java Applet Codebase Tag Arbitrary File Read
9388| [7881] Microsoft Java Implementation INativeServices Clipboard Content Disclosure
9389| [7880] Microsoft Java INativeServices Arbitrary Memory Information Disclosure
9390| [7879] Microsoft Java getAbsolutePath Current Directory Disclosure
9391| [7878] Microsoft Java Virtual Machine ClassLoader.loadClass Overflow
9392| [7877] Microsoft Java Virtual Machine Class.forName Overflow
9393| [7876] Microsoft IE .isp File Arbitrary Command Execution
9394| [7874] Microsoft IE Cross-domain Sub-frame Navigation Content Spoofing
9395| [7872] Microsoft IE ActiveX Object Code Arbitrary Command Execution (Qhosts)
9396| [7866] Microsoft IE Frame Spoofing Content Injection
9397| [7864] Microsoft IE URL History FTP Credential Disclosure
9398| [7863] Microsoft IE OBJECT Tag Long CLASSID DoS
9399| [7862] Microsoft IE User DAT File History Disclosure
9400| [7861] Microsoft IE Standard Cache Control Authentication Credential Leak
9401| [7860] Microsoft IE Java JSObject Cross Frame Security Policy Bypass
9402| [7859] Microsoft IE Frame Domain Verification Arbitrary File Access
9403| [7858] Microsoft IE CLSID Alteration Arbitrary Command Execution
9404| [7857] Microsoft IE Script Tag SRC Value Arbitrary File Access
9405| [7856] Microsoft IE Q312461 Patch HTTP_USER_AGENT Information Disclosure
9406| [7855] Microsoft IE on Windows ME Javascript Cookie Set Bypass
9407| [7854] Microsoft IE Chinese Character Scrolling DoS
9408| [7853] Microsoft IE window.createPopup Chromeless Window Spoofing
9409| [7852] Microsoft IE showModelessDialog Infinite Loop DoS
9410| [7851] Microsoft IE Multiple Form Field DoS
9411| [7850] Microsoft IE Malformed Content Header Arbitrary Command Execution
9412| [7849] Microsoft IE Javascript location.replace Recursive DoS
9413| [7848] Microsoft IE userData storeuserData Cookie Privacy Setting Bypass
9414| [7847] Microsoft IE JVM System.out.println Logging Arbitrary Command Execution
9415| [7846] Microsoft IE PNG Invalid Length Code DoS
9416| [7845] Microsoft IE Encoded URL Information Disclosure
9417| [7844] Microsoft IE Object Tag Temporary File Information Disclosure
9418| [7843] Microsoft IE URLMON.DLL Multiple Overflows
9419| [7842] Microsoft IE File Upload Control Arbitrary File Access
9420| [7841] Microsoft IE Scriptlet Component Arbitrary File Access
9421| [7840] Microsoft IE Javascript Applet Data Redirect Arbitrary File Access
9422| [7839] Microsoft IE Malformed Favorite Icon Arbitrary Command Execution
9423| [7838] Microsoft IE File Upload Control Paste Arbitrary File Read
9424| [7837] Microsoft IE Cross Frame Security Arbitrary File Access
9425| [7836] Microsoft IE EMBED Tag Overflow
9426| [7835] Microsoft IE IFRAME Document.ExecCommand Restriction Bypass Arbitrary File Access
9427| [7834] Microsoft IE Preloader Legacy ActiveX Arbitrary File Access
9428| [7833] Microsoft IE/OE res: Protocol Library Overflow
9429| [7832] Microsoft IE Client Window Reference Server Side Arbitrary File Access
9430| [7831] Microsoft IE Virtual Machine Java Applet Sandbox Bypass
9431| [7830] Microsoft IE mk: URL Handling Remote Overflow
9432| [7829] Microsoft IE JScript Engine Window.External Function Arbitrary Command Execution
9433| [7828] Microsoft IE Dotless IP Address Zone Privilege Escalation
9434| [7827] Microsoft IE Cross Security Domain Arbitrary File Access
9435| [7826] Microsoft IE SSL Certificate Validation Failure (v2)
9436| [7825] Microsoft IE Domain Frame Arbitrary File Access
9437| [7824] Microsoft IE Virtual Machine Unsigned Applet Arbitrary Command Execution
9438| [7823] Microsoft IE Cached Content .chm Arbitrary Program Execution
9439| [7822] Microsoft IE HTML Form Input Element Arbitrary File Access
9440| [7821] Microsoft IE Print Templates Feature Arbitrary ActiveX Execution
9441| [7820] Microsoft IE Scriptlet Invoking ActiveX Arbitrary File Access
9442| [7819] Microsoft IE Small IFRAME DHTML Arbitrary File Access
9443| [7818] Microsoft IE Page Redirect Authentication Credential Leak
9444| [7817] Microsoft IE Frame Domain Validation Arbitrary File Access
9445| [7816] Microsoft IE SFU Telnet Client Arbitrary Command Execution
9446| [7806] Microsoft IE HTML E-mail Feature Unusual MIME Type Command Execution
9447| [7804] Microsoft Windows HTML Help Arbitrary Code Execution
9448| [7803] Microsoft Windows showHelp Arbitrary Code Execution
9449| [7802] Microsoft IE File Download Extension Spoofing
9450| [7801] Microsoft IE Javascript window.open Null-Pointer DoS
9451| [7800] Microsoft Windows POSIX Subsystem Privilege Escalation
9452| [7798] Microsoft Windows Task Scheduler Remote Overflow
9453| [7793] Microsoft Outlook Express Header Validation DoS
9454| [7779] Microsoft IE AnchorClick Cross Zone Scripting
9455| [7778] Microsoft Outlook Window Opener Script Execution
9456| [7777] Microsoft Windows Media Control Preview Script Execution
9457| [7776] Microsoft IE Download Window Filename Filetype Spoofing
9458| [7775] Microsoft IE Channel Link Script Injection
9459| [7774] Microsoft IE Popup.show() Click Hijack (HijackClick 3)
9460| [7769] Microsoft Outlook With Word Editor Object Tag Code Execution
9461| [7762] Microsoft Java Virtual Machine Cross-Site Communication
9462| [7739] Microsoft IE plugin.ocx Load() Method Overflow
9463| [7738] Microsoft Windows Media Player Skins File Arbitrary Command Execution
9464| [7608] Microsoft Index Server Internet Data Query Path Disclosure
9465| [7607] Microsoft IE CSS Unterminated Comment Handling Memory Corruption
9466| [7576] Microsoft Windows NT RSHSVC .Rhosts Unauthorized Access
9467| [7405] Microsoft Phone Dialer (dialer.exe) Dialer Entry Overflow
9468| [7296] Microsoft IE Cross-domain Frame Injection Content Spoofing
9469| [7293] Microsoft Plus! Compressed Folder Password Disclosure
9470| [7202] Microsoft PowerPoint 2000 File Loader Overflow
9471| [7187] Microsoft MN-500 Web Administration Multiple Connections DoS
9472| [7182] Microsoft Windows Media Unicast Service Severed Connection Memory Leak DoS
9473| [7179] Microsoft Windows 2000 Event Viewer Snap-in Overflow
9474| [7178] Microsoft Windows Media Player WMP ActiveX Control Javascript Command Execution
9475| [7168] Microsoft Data Access Component Internet Publishing Provider WebDAV Security Zone Bypass
9476| [7117] Microsoft Windows RPC Locator Remote Overflow
9477| [7096] Microsoft Outlook Express Mac OS Auto HTML Download
9478| [7055] Microsoft Outlook Express for Mac OS E-mail Long Line DoS
9479| [6971] Microsoft ISA Server 2000 ICMP Rule Bypass During Startup
9480| [6970] Microsoft ISA Server 2000 Web Publishing Unencrypted Credentials Disclosure
9481| [6969] Microsoft ISA Server 2000 Invalid DNS Request DoS
9482| [6968] Microsoft ISA Server 2000 FTP Port Scan Bounce Weakness
9483| [6967] Microsoft ISA Server 2000 UDP Packet Winsock DoS
9484| [6965] Microsoft ISA Server 2000 SSL Packet DoS
9485| [6964] Microsoft ISA Server 2000 DNS Intrusion Detection Filter DoS
9486| [6963] Microsoft IE showModalDialog Method Arbitrary Code Execution
9487| [6931] Microsoft IE/Outlook Double Null Character DoS
9488| [6790] Microsoft Windows NT AEDebug Registry Key Weak Permissions
9489| [6749] Microsoft Crystal Reports Web Viewer crystalimagehandler.aspxArbitrary File Access
9490| [6742] Microsoft DirectPlay Packet Validation DoS
9491| [6674] Microsoft Office 98 for Macintosh Disk Space Information Disclosure
9492| [6672] Microsoft SharePoint with MSIE settings.htm Authentication Bypass
9493| [6640] Macromedia JRun IIS ISAPI error-handling .jsp File Overflow
9494| [6639] Macromedia JRun IIS ISAPI error-handling .cfm File Overflow
9495| [6538] Microsoft IE/Outlook ImageMap URL Spoofing
9496| [6515] Microsoft Windows 2000 Domain Expired Account Authentication
9497| [6272] Microsoft IE MIME Content-Type Header Processing Weakness Cross-content XSS
9498| [6221] Microsoft Windows XP desktop.ini CLSID Arbitrary Command Execution
9499| [6217] Microsoft Outlook RTF Embedded Object Security Bypass
9500| [6121] Microsoft Outlook Express BASE HREF Web Content Loading
9501| [6080] Microsoft IE MSHTML.DLL Cross-Frame Script Execution
9502| [6079] Microsoft Outlook Remote XML Loading
9503| [6074] Microsoft Windows Me HSC hcp:// URL XSS
9504| [6053] Microsoft Windows Help and Support Center HCP URL Code Execution
9505| [6031] Microsoft Exchange Multiple SMTP Command DoS
9506| [6007] Microsoft IE/Outlook IMG/HREF Tag Code Execution
9507| [5998] Microsoft Outlook Predictable File Caching
9508| [5993] Microsoft Active Server Pages (ASP) Engine Malformed Cookie Handling Remote Information Disclosure
9509| [5968] Microsoft Windows ARP Packet DoS
9510| [5966] Microsoft Windows NT SMB Traversal Arbitrary File Access
9511| [5965] Microsoft IE MSHTML.DLL IMG SRC Tag Information Disclosure
9512| [5936] Microsoft SMTP Service 4xx Error Code DoS
9513| [5887] Microsoft Access 97 Cleartext Password Storage
9514| [5884] Microsoft Site Server ASP Upload Remote Command Execution
9515| [5869] Microsoft IE MSHTML.DLL Javascript %01 URL Arbitrary File Access
9516| [5858] Microsoft Windows NT Rshsvc.exe Arbitrary Command Execution
9517| [5855] Microsoft Exchange MTA HELO Command Remote Overflow
9518| [5694] Microsoft IE Address Bar URL Spoofing
9519| [5687] Microsoft Windows IE and Explorer Share Name Overflow
9520| [5686] Microsoft Windows Telnet Service Account Information Disclosure
9521| [5608] Microsoft NetMeeting Malformed String DoS
9522| [5581] Trend Micro ScanMail for Microsoft Exchange Administrative Credential Disclosure
9523| [5563] Microsoft IE Telnet Client SFU Arbitrary Command Execution
9524| [5558] Microsoft Windows Media Player Advanced Streaming Format Overflow
9525| [5557] Microsoft Outlook Web Access With IE Embedded Script Execution
9526| [5556] Microsoft IE Dotless IP Intranet Zone Spoofing
9527| [5419] Microsoft IE mshtml.dll EMBED Directive Overflow
9528| [5390] Microsoft Exchange NTLM Null Session Mail Relay
9529| [5357] Microsoft Multiple Products for Mac File URL Overflow
9530| [5356] Microsoft IE for Mac Local AppleScript Invocation
9531| [5355] Microsoft MSN Chat ActiveX ResDLL Parameter Overflow
9532| [5347] Microsoft SQL Server SQLXML ISAPI Extension Remote Overflow
9533| [5343] Microsoft SQL Server SQLXML root Parameter XSS
9534| [5342] Microsoft IE Malformed Web Page Zone Spoofing
9535| [5313] Microsoft Windows Media Device Manager Invalid Local Storage Device Privilege Escalation
9536| [5312] Microsoft Windows Media Player .wma IE Cache Arbitrary Code Execution
9537| [5261] Microsoft Windows ASN.1 Double Free Code Execution
9538| [5260] Microsoft Windows SSL Library Malformed Message Remote DoS
9539| [5259] Microsoft Windows Negotiate SSP Code Execution
9540| [5258] Microsoft Windows Virtual DOS Machine Privilege Escalation
9541| [5257] Microsoft Windows Local Descriptor Table Privilege Escalation
9542| [5256] Microsoft Windows Unspecified H.323 Code Execution
9543| [5255] Microsoft Windows Management Privilege Escalation
9544| [5254] Microsoft Windows Utility Manager Privilege Escalation
9545| [5253] Microsoft Windows Help and Support Center Command Execution
9546| [5252] Microsoft Windows Metafile Code Execution
9547| [5251] Microsoft Windows Winlogon Command Execution
9548| [5250] Microsoft Windows SSL Library Private Communications Transport (PCT) Remote Overflow
9549| [5249] Microsoft Windows LDAP Crafted Request Remote DoS
9550| [5248] Microsoft Windows LSASS Remote Overflow
9551| [5247] Microsoft Windows DCOM RPC Object Identity Information Disclosure
9552| [5246] Microsoft Windows CIS/RPC Over HTTP DoS
9553| [5245] Microsoft Windows RPCSS Large Length Field DoS
9554| [5242] Microsoft IE/Outlook MHTML .chm ITS Protocol Handler Code Execution
9555| [5241] Microsoft Jet Database Engine Remote Code Execution
9556| [5179] Microsoft Windows 2000 microsoft-ds DoS
9557| [5175] Microsoft Excel Hyperlinked Workbook Arbitrary Code Execution
9558| [5174] Microsoft Excel Inline Macro Arbitrary Code Execution
9559| [5173] Microsoft Excel Embedded XSL Stylesheet Arbitrary Code Execution
9560| [5172] Microsoft Commerce Server OWC Installer LocalSystem Arbitrary Code Execution
9561| [5171] Microsoft Word 2002 Mail Merge Tool Execute Arbitrary Script
9562| [5170] Microsoft Commerce Server OWC Installer Arbitrary Command Execution
9563| [5163] Microsoft Commerce Server AuthFilter ISAPI Filter Overflow
9564| [5162] Microsoft IE Legacy Data-island Capability Read Arbitrary XML File
9565| [5152] Microsoft Legacy Text Formatting ActiveX Control Overflow
9566| [5134] Microsoft IE Reference Local HTML Resource Script Execution
9567| [5133] Microsoft Metadirectory Services LDAP Client Authentication Bypass
9568| [5129] Microsoft IE Download File Origin Spoofing
9569| [5126] Microsoft BackOffice Authentication Bypass
9570| [5124] Microsoft TSAC ActiveX Long Server Name Overflow
9571| [5064] Microsoft SQL Server Jet Engine OpenDataSource Function Overflow
9572| [4968] Microsoft SharePoint Portal Server Multiple Unspecified XSS
9573| [4951] Microsoft IE CLASSID Remote DoS
9574| [4932] Microsoft Outlook Web Access SecurID Authentication Bypass
9575| [4931] iisPROTECT Admin Interface SiteAdmin.ASP GroupName Parameter SQL Injection
9576| [4915] Microsoft Content Management Server (MCMS) Web Authoring Command File Upload Arbitrary Code Execution
9577| [4914] Microsoft Content Management Server (MCMS) Resource Request SQL Injection
9578| [4877] Microsoft Windows Terminal Services Kerberos Double Authorization Data Entry
9579| [4862] Microsoft Content Management Server (MCMS) Unspecified Authentication Function Overflow
9580| [4779] Microsoft Desktop Engine (MSDE) 2000 Stored Procedure SQL Injection
9581| [4778] Microsoft SQL Server 2000 Stored Procedure SQL Injection
9582| [4777] Microsoft Desktop Engine (MSDE) 2000 Database Consistency Checkers (DBCCs) Overflow
9583| [4776] Microsoft SQL Server 2000 Database Consistency Checkers (DBCCs) 2000 Overflow
9584| [4734] InoculateIT Microsoft Exchange Inbox Folder Tree Moved Message Scanning Bypass
9585| [4654] iisCart2000 File Upload
9586| [4627] Microsoft IE Text Control Overflow
9587| [4626] Microsoft DirectX Files Viewer xweb.ocx Overflow
9588| [4578] Microsoft SQL Resolution Service Monitor Thread Registry Key Name Overflow
9589| [4577] Microsoft SQL Resolution Service 0x08 Byte Long String Overflow
9590| [4513] Microsoft Visual C++ Constructed ISAPI Extensions
9591| [4467] Microsoft Windows WebDav ntdll.dll Remote Overflow
9592| [4186] Microsoft IE Cookie Path Traversal
9593| [4170] Microsoft Windows 2000 Server Media Services TCP Packet Handling Remote DoS
9594| [4168] Microsoft Outlook 2002 mailto URI Script Injection
9595| [4078] Microsoft IE Cross Frame Scripting Restriction Bypass
9596| [3968] Microsoft FrontPage Personal Web Server Arbitrary File Access
9597| [3903] Microsoft Windows WINS Server Remote Overflow
9598| [3902] Microsoft Windows ASN.1 Library Integer Overflow
9599| [3893] Microsoft Virtual PC for Mac Insecure Temporary Files Creation
9600| [3879] Microsoft IE File Identification Variant
9601| [3791] Microsoft IE Travel Log Arbitrary Script Execution
9602| [3738] Microsoft IE Content-disposition Header File Download Extension Spoofing
9603| [3711] Microsoft Windows XP Malicious Folder Automatic Code Execution
9604| [3501] Microsoft FrontPage form_results Information Disclosure
9605| [3490] Microsoft Exchange 2003 OWA Mailbox Access Information Disclosure
9606| [3457] Microsoft MDAC Broadcast Reply Overflow
9607| [3386] Microsoft FrontPage Server Extensions htimage.exe File Existence Enumeration
9608| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
9609| [3384] Microsoft FrontPage htimage.exe Overflow
9610| [3383] Microsoft FrontPage Server Extensions imagemap.exe File Verification
9611| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
9612| [3381] Microsoft FrontPage imagemap.exe Overflow
9613| [3337] ColdFusion on IIS cfm/dbm Diagnostic Error Path Disclosure
9614| [3313] Microsoft Word Form Protection Bypass
9615| [3307] Microsoft IE showHelp() Zone Restriction Bypass
9616| [3300] Microsoft FrontPage shtml MS-DOS Device Name DoS
9617| [3225] Microsoft IE for Mac Information Disclosure
9618| [3213] SecureIIS Error Page Information Disclosure
9619| [3212] SecureIIS Encoded URI Arbitrary File Access
9620| [3211] SecureIIS HTML Encoded Characters Bypass Ruleset
9621| [3209] SecureIIS HTTP Request Overflow Protection Bypass
9622| [3195] Microsoft Exchange OWA REFERER Header XSS
9623| [3184] IISShield HTTP Request Bypass Ruleset
9624| [3183] iisPROTECT Encoded URL Authentication Bypass
9625| [3144] Microsoft IE MHTML Redirection Local File Parsing (MhtRedirParsesLocalFile)
9626| [3143] Microsoft IE MHTML Arbitrary File Execution (MhtRedirLaunchInetExe)
9627| [3142] Microsoft IE Subframe XSS (BackToFramedJpu)
9628| [3111] Microsoft IE Windows Scripting Host (WSH) GetObject Javascript Function Arbitrary File Access
9629| [3108] Microsoft Office 98 Macintosh Information Disclosure
9630| [3106] Microsoft Windows Password Authentication Security Point of Failure
9631| [3104] Microsoft IE PPC Overwrite Arbitrary Files
9632| [3099] Microsoft IE _search Window Execute Code (WsBASEjpu)
9633| [3098] Microsoft IE history.back NAF Function Execute Script (NAFjpuInHistory)
9634| [3097] Microsoft IE window.open Function Execute Code (WsFakeSrc)
9635| [3096] Microsoft IE NavigateAndFind Function Execute Code (NAFfileJPU)
9636| [3095] Microsoft IE history.back Function Information Disclosure (RefBack)
9637| [3094] Microsoft IE window.moveBy Cursor Hijack (HijackClick)
9638| [3068] Microsoft IE MSHTML/EditFlag Auto Open DoS
9639| [3067] Microsoft Windows Media Player ASF File Arbitrary Code Execution
9640| [3066] Microsoft IE Custom HTTP Errors Script Injection
9641| [3065] Microsoft IE Unparsable XML File XSS
9642| [3056] Microsoft IE MSN/Alexa Information Leak
9643| [3055] Microsoft IE Spoofed URL
9644| [3054] Microsoft IE %USERPROFILE% Folder Disclosure
9645| [3053] Microsoft IE MHTML File Handler Arbitrary Script Injection
9646| [3052] Microsoft IE/Outlook CODEBASE PopUp Object Remote Execution
9647| [3051] Microsoft IE MHT Web Archive Overflow
9648| [3050] Microsoft IE dragDrop Method Local File Reading
9649| [3049] Microsoft IE ftp.htt FTP Web View URL XSS
9650| [3036] Microsoft IE dynsrc File Information Leak
9651| [3035] Microsoft WebBrowser Control t:video File Execution
9652| [3034] Microsoft IE JavaScript script src Local File Enumeration
9653| [3033] Microsoft IE Content Type/Disposition File Execution
9654| [3032] Microsoft IE XMLHTTP Control Arbitrary Remote File Access
9655| [3031] Microsoft IE document.Open Same Origin Policy Violation
9656| [3030] Microsoft IE GetObject() Function Traveral Arbitrary File Access
9657| [3029] Microsoft IE Cookie Execute Script in Local Computer Zone
9658| [3028] Microsoft IE Content-disposition Header Auto Download/Execute
9659| [3011] Microsoft IE OWC ConnectionFile File Existence Verification
9660| [3010] Microsoft IE OWC XMLURL File Existence Verification
9661| [3009] Microsoft IE OWC Load File Existence Verification
9662| [3008] Microsoft IE OWC Cut/Paste Data Read and Injection
9663| [3007] Microsoft IE OWC LoadText Read Arbitrary File
9664| [3006] Microsoft IE OWC Script Execution
9665| [3005] Microsoft IE WebBrowser Control dialogArguments XSS
9666| [3004] Microsoft IE Gopher Client Overflow
9667| [3003] Microsoft IE/Outlook OBJECT Cross Domain Scripting
9668| [3002] Microsoft IE File Extension Dot Parsing
9669| [3001] Microsoft IE XP HCP URI Handler File Deletion
9670| [2999] Microsoft IE Powerpoint Mouse-Over Execute
9671| [2998] Microsoft IE Frame Javascript URL Cross-Domain Script Execution
9672| [2997] Microsoft IE oIFrameElement.Document IFRAME Bypass
9673| [2996] Microsoft IE Object Zone Redirection
9674| [2995] Microsoft IE (VictimWindow).document.write Cross Domain Scripting (SaveRef)
9675| [2994] Microsoft IE (NewWindow).location.assign Save Reference
9676| [2993] Microsoft IE % URL Encoding XSS
9677| [2992] Microsoft IE HTML Help ActiveX Control alink and showHelp Overflow
9678| [2991] Microsoft WinHlp Active-X Item Parameter Overflow
9679| [2990] Microsoft IE IFRAME dialogArguments Object Bypass (BadParent)
9680| [2986] Microsoft IE clipboardData Object Caching Cross-domain Policy Bypass
9681| [2985] Microsoft IE execCommand Object Caching
9682| [2984] Microsoft IE getElementsByTagName Object Caching
9683| [2983] Microsoft IE getElementsByName Object Caching
9684| [2982] Microsoft IE getElementById Object Caching
9685| [2981] Microsoft IE elementFromPoint Object Caching
9686| [2980] Microsoft IE createRange Object Caching
9687| [2979] Microsoft IE external Object Caching
9688| [2978] Microsoft IE showModalDialog Object Caching
9689| [2977] Microsoft IE XML Datasource Read Local Files
9690| [2976] Microsoft IE CTRL Key onkeydown Remote File Theft
9691| [2975] Microsoft IE Back Button XSS
9692| [2974] Microsoft IE/Outlook Temporary Internet File Execution
9693| [2973] Microsoft IE Third Party Plugin Rendering XSS
9694| [2972] Microsoft IE showModalDialog Script Execution
9695| [2971] Microsoft WMP File Attachment Script Execution
9696| [2970] Microsoft IE cssText Arbitrary File Access
9697| [2969] Microsoft VM Bytecode Verifier Execute Arbitrary Code
9698| [2968] Microsoft IE File Download Dialog Overflow
9699| [2967] Microsoft IE Object Type Property Overflow
9700| [2966] Microsoft IE BR549.DLL Overflow
9701| [2965] Microsoft IE Cache Script Execution in My Zone
9702| [2963] Microsoft IE align HTML Converter Overflow
9703| [2960] Microsoft Windows Messenger Service Social Engineering Weakness
9704| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
9705| [2917] Microsoft Access Known Database Attack
9706| [2801] Microsoft Word and Excel Execution of Arbitrary Code
9707| [2800] Microsoft FrontPage Server Extensions SmartHTML DoS
9708| [2784] Microsoft IE Component Function Information Disclosure
9709| [2783] Microsoft IE XML Objection Information Disclosure (IredirNrefresh)
9710| [2751] Microsoft Word Macro Name Handling Overflow
9711| [2745] Microsoft HTML Help Control Privilege Escalation
9712| [2707] Microsoft IE Drag and Drop Arbitrary File Installation
9713| [2705] Microsoft Windows 2000 Windows Troubleshooter ActiveX Overflow
9714| [2692] Microsoft Windows Design Tools MDT2DD.DLL COM Object Memory Corruption Command Execution
9715| [2679] Microsoft Outlook Web Access XSS
9716| [2678] Microsoft Windows Overflow in ListBox and
9717| [2677] Microsoft Windows Arbitrary ActiveX Control Installation
9718| [2675] Microsoft Windows HCP protocol Overflow
9719| [2674] Microsoft Exchange SMTP Extended Request Overflow
9720| [2670] Microsoft Windows RPC Race Condition DoS
9721| [2657] Microsoft Windows Message Queuing Service Heap Overflow
9722| [2656] Hummingbird CyberDOCS on IIS Script Source Disclosure
9723| [2655] Microsoft Windows Server 2003 Shell Folders Arbitrary File Access
9724| [2642] Microsoft Windows Unauthorised Thread Termination
9725| [2592] Microsoft PowerPoint Modify Protection Bypass
9726| [2572] Microsoft BizTalk Server Insecure Permissions
9727| [2571] Microsoft Windows TCP Packet URG Value Information Disclosure
9728| [2544] Microsoft ASP.NET Request Validation Bypass
9729| [2540] Microsoft Windows 2003 Server Buffer Overflow Protection Mechanism Bypass
9730| [2535] Microsoft Windows DCOM RPCSS Service Filename Parameter Overflow
9731| [2510] Microsoft Access Snapshot Viewer Buffer Overflow
9732| [2508] Microsoft Visual Basic for Applications Buffer Overflow
9733| [2507] Microsoft Windows NetBIOS Random Memory Content Disclosure
9734| [2506] Microsoft Word/Works Automated Macro Execution
9735| [2453] Microsoft IE My Computer Zone Caching Issue
9736| [2451] Microsoft IE Object Data Header Type Safe File Execution
9737| [2423] Microsoft MCWNDX.OCX ActiveX Plugin Overflow
9738| [2368] IISShield Crafted HTTP Request Filtering Bypass
9739| [2329] Microsoft SQL Server Named Pipe Hijacking Local Privilege Escalation
9740| [2328] Microsoft Windows NT 4.0 with IBM JVM DoS
9741| [2320] Microsoft ISA Server HTTP Error Handler XSS
9742| [2306] Microsoft FrontPage Server Extensions SmartHTML Interpreter shtml.dll DoS
9743| [2299] Microsoft SQL Server Named Pipe Handling Request Remote DoS
9744| [2298] Microsoft ISA Server Error Page XSS
9745| [2291] Microsoft IE DOM Script Source Recursive DoS
9746| [2288] Microsoft Utility Manager Local Privilege Escalation
9747| [2283] Microsoft Exchange OWA Execute Arbitrary Code
9748| [2262] Microsoft Windows Media Player DHTML Local Zone Access
9749| [2247] Microsoft Windows Media Services Remote Command Execution #2
9750| [2244] Microsoft Windows 2000 ShellExecute() API Let
9751| [2239] Microsoft NetMeeting Arbitrary File Write/Execution
9752| [2237] Microsoft Windows 2000 Active Directory Lsass.exe Overflow
9753| [2100] Microsoft Windows RPC DCOM Interface Overflow
9754| [2096] Microsoft ISA Server SurfControl Web Filter
9755| [2074] Microsoft Windows Server Message Block (SMB) Protocol SMB_COM_TRANSACTION Packet Remote Overflow DoS
9756| [2073] Microsoft Windows XP Network Share Provider Overflow
9757| [2072] Microsoft Windows Network Connection Manager Privilege Elevation
9758| [2061] Microsoft Outlook HTML Mail Script Execution
9759| [2060] Microsoft IE Known Local File Script Execution
9760| [2051] Microsoft Windows User Shell Buffer Overflow
9761| [2049] Microsoft Commerce Server ISAPI Long Authentication Overflow
9762| [2047] Microsoft IE Content-Type Field Arbitrary File Execution
9763| [2046] Microsoft IE Forced Script Execution
9764| [2045] Microsoft IE HTML Document Directive Overflow
9765| [2043] Microsoft Telnet Server Protocol Option Handling Remote Overflow
9766| [2042] Microsoft Exchange System Attendant WinReg Remote Registry Key Manipulation
9767| [2041] Microsoft Office for Macintosh Network PID Checker DoS
9768| [2037] Microsoft Windows Trusted Domain SID Remote Privilege Escalation
9769| [2010] Microsoft SQL Server C Runtime Functions Format String DoS
9770| [2008] Microsoft IE Same Origin Policy Violation
9771| [2004] Microsoft IE Cross-frame Remote File Access
9772| [1995] Microsoft IE Download Dialog File Extension Spoofing Weakness
9773| [1992] Microsoft IE Cookie Disclosure
9774| [1990] Microsoft Windows Terminal Services False IP Address
9775| [1982] Microsoft IE about: URI XSS
9776| [1978] Microsoft IE for Mac OS Download Execution
9777| [1975] Microsoft Windows Terminal Server Service RDP Remote DoS
9778| [1972] Microsoft IE HTTP Request Encoding Spoofing Weakness
9779| [1971] Microsoft IE Dotless IP Zone Spoofing Weakness
9780| [1968] Microsoft Excel/PowerPoint Macro Security Bypass
9781| [1957] Microsoft Exchange OWA Malformed Request DoS
9782| [1949] Symantec Norton Anti-Virus for Microsoft Exchange 2000 INBOX Path Information Disclosure
9783| [1934] Microsoft ISA Server Invalid URL Error Message XSS
9784| [1933] Microsoft ISA Server Proxy Service Memory Leak DoS
9785| [1932] Microsoft ISA Server H.323 Memory Leak DoS
9786| [1928] Microsoft Windows NNTP Malformed Post DoS
9787| [1915] Microsoft Windows Media Player .NSC File Overflow
9788| [1912] Microsoft Windows Terminal Server Malformed RDP DoS
9789| [1902] Microsoft Outlook View ActiveX Arbitrary Command Execution
9790| [1867] Microsoft Word Document Macro Execution
9791| [1864] Microsoft SQL Server Administrator Cached Connection
9792| [1861] Microsoft Windows Telnet Local System Call DoS
9793| [1860] Microsoft Windows Telnet Service Handle Leak DoS
9794| [1859] Microsoft Windows Telnet Multiple Sessions DoS
9795| [1858] Microsoft Windows Telnet Service Logon Backspace DoS
9796| [1856] Microsoft Exchange OWA Embedded Script Execution
9797| [1852] Microsoft Outlook Address Book Spoofing Weakness
9798| [1840] Microsoft Windows Media Player Internet Shortcut Execution
9799| [1838] Microsoft Word .asd Macro File Execution
9800| [1837] Microsoft Word RTF Template Macro Execution
9801| [1832] Microsoft IE Spoofed SSL Certificates
9802| [1831] Microsoft IE Server Certificate Validation Failure
9803| [1820] Microsoft Index Server Search Parameter Overflow
9804| [1789] Microsoft ISA Server Web Proxy Malformed HTTP Request Parsing Remote DoS
9805| [1764] Microsoft Windows 2000 Domain Controller DoS
9806| [1758] Microsoft Windows 2000 Network DDE Escalated Privileges
9807| [1755] Microsoft Windows 2000 RDP Malformed Packet Handling Remote DoS
9808| [1735] Microsoft Windows NT SNMP WINS Database Deletion Remote DoS
9809| [1725] Microsoft Windows Media Player .WMZ Arbitrary Java Applet Execution
9810| [1724] Microsoft Web Client Extender NTLM Credential Disclosure
9811| [1685] Microsoft IE .lnk/.url Arbitrary Command Execution
9812| [1672] Microsoft Windows 2000 Telnet Session Timeout DoS
9813| [1658] Microsoft Windows Media Player .ASX File Handling Overflow
9814| [1656] Microsoft Windows Media Player .WMS Arbitrary Script Execution
9815| [1650] Microsoft Exchange Server EUSR_EXSTOREEVENT Default Account
9816| [1639] Microsoft Windows NT Terminal Server RegAPI.DLL Username Overflow
9817| [1633] Microsoft Windows 2000 System Monitor ActiveX LogFileName Parameter Validation Overflow
9818| [1621] Microsoft Indexing Services for Windows 2000 .htw XSS
9819| [1609] Microsoft NetMeeting Remote Desktop Sharing Malformed String Handling DoS
9820| [1607] Microsoft Windows 9x Invalid Driver Type DoS
9821| [1606] Microsoft IE Cached Web Credentials Disclosure
9822| [1599] Microsoft Windows 9x / Me IPX NMPI Packet DoS
9823| [1591] Microsoft Windows 2000 OEMPreinstall Installation Permission Weakness
9824| [1578] Microsoft Windows 2000 Simplified Chinese IME Local Privilege Escalation
9825| [1571] Microsoft Windows Media Player Malformed Embedded OCX Control DoS
9826| [1563] Microsoft Windows / Office DLL Search Path Weakness
9827| [1553] Microsoft WebTV annclist.exe Malformed UDP Packet Parsing Remote DoS
9828| [1546] Microsoft Windows Media Unicast Service Malformed Request DoS
9829| [1537] Microsoft Outlook Rich Text Format Information Disclosure
9830| [1530] Microsoft Money Cleartext Password Storage
9831| [1510] Microsoft IE Folder.htt Modification Privilege Escalation
9832| [1505] Microsoft Word Mail Merge Arbitrary Command Execution
9833| [1502] Microsoft IE Scriptlet Rendering
9834| [1500] Microsoft Word / Excel / Powerpoint 2000 Object Tag Buffer Overflow
9835| [1491] Microsoft Windows 9x IPX Ping Packet DoS
9836| [1475] Microsoft Outlook/Express Cache Bypass
9837| [1467] Microsoft Outlook/Express GMT Field Buffer Overflow
9838| [1464] Microsoft IE/Outlook DHTMLED / IFRAME Arbitrary File Access
9839| [1461] Microsoft Enterprise Manager DTS Package Password Disclosure
9840| [1455] Microsoft Excel REGISTER.ID Function Arbitrary Code Execution
9841| [1451] Microsoft SQL Server Stored Procedure Local Permission Restriction Bypass
9842| [1437] Microsoft Windows 2000 Telnet Server Binary Zero Parsing Remote DoS
9843| [1428] Microsoft IE/Office ActiveX Object Execution
9844| [1427] Microsoft IE VBA Code Execution
9845| [1399] Microsoft Windows 2000 Windows Station Access
9846| [1378] Microsoft IE SSL Certificates Validation Failure (v1)
9847| [1369] Microsoft SQL Server DTS Password Disclosure
9848| [1368] Microsoft Media Encoder Request Parsing Local DoS
9849| [1358] Microsoft Windows NT HostAnnouncement DoS
9850| [1342] Microsoft IE DocumentComplete() Cross Frame Access
9851| [1341] Microsoft IE ActiveX Combined Component Attributes
9852| [1328] Microsoft Office 2000 UA Control ActiveX (Ouactrl.ocx) Show Me Function Remote Code Execution
9853| [1326] Microsoft IE Crafted URL Cross Domain Cookie Disclosure
9854| [1308] Microsoft Windows NetBIOS NULL Source Name DoS
9855| [1297] Microsoft Windows 2000 Active Directory Object Attribute
9856| [1292] Microsoft Windows NT 4.0 / 2000 cmd.exe Buffer Overflow
9857| [1272] Microsoft Excel XLM Arbitrary Macro Execution
9858| [1268] Microsoft Windows TCP/IP Printing Service DoS
9859| [1257] Microsoft Windows Media License Manager DoS
9860| [1251] Microsoft Windows MS DOS Device Name DoS
9861| [1250] Microsoft SQL Server Non-Validated Query
9862| [1244] Microsoft Clip Art Buffer Overflow
9863| [1226] Microsoft Windows Media Server Malformed Handshake Sequence DoS
9864| [1214] Microsoft Windows NT Recycle Bin Deleted File Access
9865| [1209] Microsoft Terminal Server rdisk Registry Information Disclosure
9866| [1208] Microsoft East Asian Word Conversion Document Arbitrary Command Execution
9867| [1207] Microsoft SMS Remote Control Weak Permission Privilege Escalation
9868| [1199] Microsoft Windows NT NtImpersonateClientOfPort LPC Privilege Escalation
9869| [1188] Microsoft CIS IMAP Server Remote Overflow
9870| [1166] Microsoft Windows NT LsaLookupSids() DoS
9871| [1161] Microsoft Windows Help System File Manipulation Local Privilege Escalation
9872| [1156] Microsoft IE MSDXM.OCX vnd.ms.radio URL Handling Overflow
9873| [1152] Microsoft IE Web Proxy Auto-Discovery Unauthorized Proxy Reconfiguration
9874| [1146] Microsoft Windows 9x Credential Cache Cleartext Password Disclosure
9875| [1145] Microsoft IE Offline Browsing Pack Task Scheduler
9876| [1143] Microsoft SQL Server TDS Header NULL Data Handling Remote DoS
9877| [1139] Microsoft Rich Text Format (RTF) Reader Malformed Control Word Overflow
9878| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
9879| [1134] Microsoft Windows NT Print Spooler Malformed Request Overflow
9880| [1095] Microsoft Windows NT RPC Locator (RPCSS.EXE) CPU Utilization DoS
9881| [1076] Microsoft Windows IP Source Routing
9882| [1075] Microsoft Windows NT RASMAN Path Subversion Privilege Escalation
9883| [1069] Microsoft IE Import/Export Favorites
9884| [1056] Microsoft Java Virtual Machine Sandbox Bypass
9885| [1054] Microsoft IE scriptlet.typelib ActiveX Arbitrary Command Execution
9886| [1052] Microsoft Jet Database Text I-ISAM Arbitrary File Modification
9887| [1046] Microsoft Windows telnet.exe Argument Overflow
9888| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
9889| [1031] Microsoft Exchange Server Encapsulated SMTP Address Open Relay
9890| [1022] Microsoft Windows Invalid IGMP Header Handling Remote DoS
9891| [1019] Microsoft Taskpads Feature Arbitrary Script Injection
9892| [1013] Microsoft Windows NT Screensaver Context Local Privilege Escalation
9893| [1010] Microsoft Windows NT Malformed LSA Request DoS
9894| [967] Microsoft Windows NT WINS Service Malformed Data DoS
9895| [945] Microsoft Windows 95/98 SMB Authentication Replay
9896| [943] Microsoft Windows NT SP4 Null NT Hash Value Share Access
9897| [931] Microsoft Windows NT GINA Arbitrary Clipboard Content Disclosure
9898| [925] Microsoft Excel 97 CALL Arbitrary Command Execution
9899| [922] Microsoft NetMeeting Clipboard Remote Overflow
9900| [878] Microsoft SQL Resolution Service Keep-Alive Function DoS
9901| [868] Microsoft Windows Compressed Folders ZIP Decompression Arbitrary File Write
9902| [867] Microsoft Windows Compiled HTML Help (.chm) Arbitrary Command Execution
9903| [866] Microsoft Remote Data Protocol (RDP) Implementation Cryptographic Information Disclosure
9904| [864] Microsoft Windows Certificate Enrollment ActiveX Arbitrary Certificate Deletion
9905| [863] Microsoft Exchange Malformed Mail Attribute DoS
9906| [858] Microsoft Windows NCM Handler Local Privilege Elevation
9907| [852] Microsoft Exchange EHLO Long Hostname Overflow
9908| [837] Microsoft Windows RAS Phonebook dial-up String Overflow
9909| [831] Microsoft Site Server LDAP_Anonymous Account Default Password
9910| [788] Microsoft Windows smss.exe Handle Duplication Local Privilege Escalation
9911| [773] Microsoft Windows 2000 Group Policy File Lock DoS
9912| [772] Microsoft Windows Multiple UNC Provider Request Overflow
9913| [763] Microsoft IE VBScript Mis-Handling Arbitrary File Access
9914| [736] Microsoft Windows SMB Enumeration Information Disclosure
9915| [732] Microsoft Windows SMTP Service Malformed BDAT Request Remote DoS
9916| [715] Microsoft Windows NT LsaQueryInformationPolicy Function NULL Session Domain SID Enumeration
9917| [714] Microsoft Windows NT LsaQueryInformationPolicy() Function SID User Account Disclosure
9918| [697] Microsoft Windows Universal Plug and Play NOTIFY DoS
9919| [692] Microsoft Windows Universal Plug and Play NOTIFY Overflow
9920| [673] Microsoft Windows NT RPC Endpoint Mapper Malformed Request DoS
9921| [665] Microsoft Windows 95 Online Registration Information Disclosure
9922| [626] Microsoft Exchange OWA fumsg.asp Global Address List (GAL) Disclosure
9923| [608] Microsoft Windows IrDa Driver Malformed Packet Remote Overflow DoS
9924| [601] Microsoft Exchange Server LDAP Bind Function Overflow
9925| [581] Microsoft Windows SMTP Incorrect Credentials Authentication Bypass
9926| [572] Microsoft Windows NT NTLMSSP Crafted LPC Request Local Privilege Escalation
9927| [558] Microsoft SQL Server 0x02 Packet Remote Information Disclosure
9928| [553] Microsoft Index Server Malformed Search Arbitrary Server-side Include File Access
9929| [531] Microsoft SQL Server Registry Key Permission Weakness Privilege Escalation
9930| [516] Microsoft Point-to-Point Tunneling Protocol (PPTP) Encryption Weakness
9931| [515] Microsoft Windows 2000 LDAP Server Arbitrary User Password Modification
9932| [511] Microsoft Windows Malformed PPTP Packet Stream Remote DoS
9933| [499] Microsoft Windows NT Winsock2ProtocolCatalogMutex Mutex Local DoS
9934| [466] Microsoft Windows NT RAS Administration Registry Key Permission Weakness Local Privilege Escalation
9935| [457] Microsoft Exchange Malformed MIME Header DoS
9936| [454] Microsoft Windows 2000 NTLM Domain Account Lockout Policy Bypass
9937| [445] Microsoft Windows LAN Manager SNMP LanMan Information Disclosure
9938| [424] Microsoft Windows NT Malformed LPC Request Remote DoS
9939| [423] Microsoft Windows File Share Password Protection Bypass
9940| [418] Microsoft Windows telnet.exe NTLM Authentication Information Disclosure
9941| [408] Microsoft Windows Malformed DCE/RPC SMBwriteX Request DoS
9942| [403] Microsoft Windows 2000 Still Image Service WM_USER Message Local Overflow
9943| [398] Microsoft Windows 2000 Malformed RPC Traffic Local Security Policy Corruption DoS
9944| [396] Microsoft FrontPage shtml.exe MS-DOS Device Name Request DoS
9945| [385] Microsoft Windows Shell Executable (Explorer.exe) Registry Relative Path Privilege Escalation
9946| [336] Microsoft Windows CIFS Computer Browser ResetBrowser Frame DoS
9947| [335] Microsoft Windows Fragmented IP Packet Saturation DoS (jolt2)
9948| [334] Microsoft Windows Registry: Permission to Modify Common Paths
9949| [332] Microsoft Windows Registry Key Permission Weakness Admin Privilege Escalation
9950| [331] Microsoft Windows Remote Registry Access
9951| [316] Microsoft Windows NT Remote Registry Server WinLogon.exe Malformed Request Local DoS
9952| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
9953| [304] Microsoft Windows NT service pack level via remote registry access
9954| [303] Microsoft Windows NetBIOS Null Session Remote Registry Access
9955| [300] Microsoft Windows SMB LanMan Pipe Server Listing Disclosure
9956| [299] Microsoft Windows NetBIOS Shares Access Control Weakness
9957| [297] Microsoft Windows Installation ADMIN$ Share Arbitrary Access
9958| [282] Microsoft FrontPage dvwssr.dll Backdoor and Overflow
9959| [218] Microsoft Windows Multiple TCP/IP Stack Malformed Ping DoS
9960| [129] Microsoft Windows NT FTP 'guest' Account
9961| [111] Microsoft Personal Web Server Multiple Dot Request Arbitrary File Access
9962| [68] Microsoft FrontPage Extensions .pwd File Permissions
9963| [67] Microsoft FrontPage Extension shtml.dll Anonymous Account Information Disclosure
9964|_
9965Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
9966OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
9967No OS matches for host
9968Network Distance: 10 hops
9969Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
9970
9971TRACEROUTE (using port 80/tcp)
9972HOP RTT ADDRESS
99731 249.61 ms 10.238.204.1
99742 249.65 ms 45.131.4.2
99753 249.67 ms 109.236.95.230
99764 249.70 ms 109.236.95.167
99775 249.72 ms ae3.amster51.ams.seabone.net (195.22.213.126)
99786 353.59 ms racc.istanbul4.ist.seabone.net (93.186.132.157)
99797 353.65 ms superonline.istanbul1.ist.seabone.net (93.186.132.155)
99808 ... 9
998110 353.80 ms 2.58.141.4
9982
9983NSE: Script Post-scanning.
9984Initiating NSE at 01:17
9985Completed NSE at 01:17, 0.00s elapsed
9986Initiating NSE at 01:17
9987Completed NSE at 01:17, 0.00s elapsed
9988######################################################################################################################################
9989Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-15 01:17 EDT
9990NSE: Loaded 47 scripts for scanning.
9991NSE: Script Pre-scanning.
9992Initiating NSE at 01:17
9993Completed NSE at 01:17, 0.00s elapsed
9994Initiating NSE at 01:17
9995Completed NSE at 01:17, 0.00s elapsed
9996Initiating Parallel DNS resolution of 1 host. at 01:17
9997Completed Parallel DNS resolution of 1 host. at 01:17, 0.02s elapsed
9998Initiating UDP Scan at 01:17
9999Scanning 2.58.141.4 [15 ports]
10000Completed UDP Scan at 01:17, 5.17s elapsed (15 total ports)
10001Initiating Service scan at 01:17
10002Scanning 13 services on 2.58.141.4
10003Service scan Timing: About 7.69% done; ETC: 01:38 (0:19:36 remaining)
10004Completed Service scan at 01:19, 102.58s elapsed (13 services on 1 host)
10005Initiating OS detection (try #1) against 2.58.141.4
10006Retrying OS detection (try #2) against 2.58.141.4
10007Initiating Traceroute at 01:19
10008Completed Traceroute at 01:19, 7.32s elapsed
10009Initiating Parallel DNS resolution of 1 host. at 01:19
10010Completed Parallel DNS resolution of 1 host. at 01:19, 0.00s elapsed
10011NSE: Script scanning 2.58.141.4.
10012Initiating NSE at 01:19
10013Completed NSE at 01:19, 8.09s elapsed
10014Initiating NSE at 01:19
10015Completed NSE at 01:19, 2.26s elapsed
10016Nmap scan report for 2.58.141.4
10017Host is up (0.24s latency).
10018
10019PORT STATE SERVICE VERSION
1002053/udp open|filtered domain
1002167/udp open|filtered dhcps
1002268/udp open|filtered dhcpc
1002369/udp open|filtered tftp
1002488/udp open|filtered kerberos-sec
10025123/udp open|filtered ntp
10026137/udp filtered netbios-ns
10027138/udp filtered netbios-dgm
10028139/udp open|filtered netbios-ssn
10029161/udp open|filtered snmp
10030162/udp open|filtered snmptrap
10031389/udp open|filtered ldap
10032500/udp open|filtered isakmp
10033|_ike-version: ERROR: Script execution failed (use -d to debug)
10034520/udp open|filtered route
100352049/udp open|filtered nfs
10036Too many fingerprints match this host to give specific OS details
10037
10038TRACEROUTE (using port 137/udp)
10039HOP RTT ADDRESS
100401 299.01 ms 10.238.204.1
100412 ... 3
100424 124.65 ms 10.238.204.1
100435 719.81 ms 10.238.204.1
100446 719.81 ms 10.238.204.1
100457 719.81 ms 10.238.204.1
100468 719.78 ms 10.238.204.1
100479 620.16 ms 10.238.204.1
1004810 100.11 ms 10.238.204.1
1004911 ... 18
1005019 100.27 ms 10.238.204.1
1005120 100.08 ms 10.238.204.1
1005221 ... 27
1005328 100.49 ms 10.238.204.1
1005429 ...
1005530 131.66 ms 10.238.204.1
10056
10057NSE: Script Post-scanning.
10058Initiating NSE at 01:19
10059Completed NSE at 01:19, 0.00s elapsed
10060Initiating NSE at 01:19
10061Completed NSE at 01:19, 0.00s elapsed
10062#######################################################################################################################################
10063Hosts
10064=====
10065
10066address mac name os_name os_flavor os_sp purpose info comments
10067------- --- ---- ------- --------- ----- ------- ---- --------
100682.58.141.4 Unknown device
10069
10070Services
10071========
10072
10073host port proto name state info
10074---- ---- ----- ---- ----- ----
100752.58.141.4 53 udp domain unknown
100762.58.141.4 67 udp dhcps unknown
100772.58.141.4 68 udp dhcpc unknown
100782.58.141.4 69 udp tftp unknown
100792.58.141.4 88 udp kerberos-sec unknown
100802.58.141.4 123 udp ntp unknown
100812.58.141.4 137 udp netbios-ns filtered
100822.58.141.4 138 udp netbios-dgm filtered
100832.58.141.4 139 udp netbios-ssn unknown
100842.58.141.4 161 udp snmp unknown
100852.58.141.4 162 udp snmptrap unknown
100862.58.141.4 389 udp ldap unknown
100872.58.141.4 500 udp isakmp unknown
100882.58.141.4 520 udp route unknown
100892.58.141.4 2049 udp nfs unknown
10090#######################################################################################################################################
10091 Anonymous JTSEC #OpTurkey Full Recon #8